Posts Tagged ‘security’

Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cloud services providers are subject to HIPAA as business associates even if they are unable to view PHI.


Three Ways Cybersecurity Can Put Your Firm Out of Business

Three Ways Cybersecurity Can Put Your Firm Out of Business

In an industry founded on the legal and ethical obligation to keep information confidential, a data breach erodes trust and may even be grounds for legal and regulatory actions.


3 Ways E-Discovery is Safer in the Cloud than On-Premise

3 Ways E-Discovery is Safer in the Cloud than On-Premise

Many firms have the mistaken impression that their data is safest where they can “touch” it and are hesitant to move it from on-premise to the cloud. Yet, law firms aren’t actually that confident about their own security.


Learning To Trust Cloud Security

Learning To Trust Cloud Security

Cloud-centric computing is inevitable because the network, not your network, is just a conduit to allow access from trusted requestors to trusted resources.


Do Lawyers Actually Realize When They’re Using the Cloud?

Do Lawyers Actually Realize When They’re Using the Cloud?

“Law firms that elect to avoid cloud-driven solutions with the intention of offering clients greater security may not actually be providing greater security.”


Containers Battle Barriers in Drive to Revolutionize Software

Containers Battle Barriers in Drive to Revolutionize Software

One of today’s most disruptive information technology trends is software containers, a technology that’s poised to transform the enterprise IT landscape by revolutionizing the way software is built and run.


Information Governance for Mobile Messaging and the Role of Enterprise Apps

Information Governance for Mobile Messaging and the Role of Enterprise Apps

Many business executives are overwhelmed by the management of mobile devices and the information they create. That does not have to be the case.


BC Partners, Medina Capital Announce Definitive Agreement To Acquire Brainspace

BC Partners, Medina Capital Announce Definitive Agreement To Acquire Brainspace

BC Partners and Medina Capital today announced an agreement to acquire Brainspace Corporation, a privately-held machine learning and analytics company based in Addison, Texas, as part of a new joint venture to create a global cybersecurity company providing software, services and infrastructure.


Discovery Automation Technology: Automation and Selective Culling

Discovery Automation Technology: Automation and Selective Culling

“It’s really the first complete offering of what we call data discovery from the point of creation.”


Is Your Business Prepared for the SaaS Tsunami?

Is Your Business Prepared for the SaaS Tsunami?

Rogue SaaS adoption invites a host of risks, from unprotected corporate data, including personally identifiable employee or client information, payment card details and intellectual property, to wasted IT spend on unused SaaS subscriptions.


The State of File Sync and Share

The State of File Sync and Share

Now more than ever before there is an increased demand for employees to share and collaborate on documents with people inside and outside of their organizations.


3 Guidelines to Maximize Value of Data

3 Guidelines to Maximize Value of Data

Don’t think that data is only a value driver for stratospheric M&A valuations. It can also form a significant portion of the remaining value of a company during the bankruptcy process.


What is In-Place Records Management?

What is In-Place Records Management?

In-Place Records Management is when the Records Management Solution does not physically move the content to manage it; the content remains it its original location, but the solution is managing the retention policies and overall File Plan for the content.


Data Debunked: The Myths and Truths About File Analysis

Data Debunked: The Myths and Truths About File Analysis

Analysis of a file share environment – in isolation – is not information governance; it is simply a snapshot assessment of content at a given point in time.


Customer List Confusion: The Pesky Persistence of the “Brummerhop” Rule in Texas Trade Secrets Litigation

Customer List Confusion: The Pesky Persistence of the “Brummerhop” Rule in Texas Trade Secrets Litigation

I’ve noticed that some Texas courts are also confused about customer lists as trade secrets. They think that a misappropriated customer list can be a “trade secret”even if the information in the list is “readily ascertainable” by competitors.


Time to Upgrade Data Loss Prevention to DLP 2.0

Time to Upgrade Data Loss Prevention to DLP 2.0

The good news is that existing DLP can easily be enhanced with other technology that can fill in the gaps and enable it to play to its strengths – essentially upgrading it to “DLP 2.0”.


The Internet of Things Meets the Four Stages of Attorney E-Grief

The Internet of Things Meets the Four Stages of Attorney E-Grief

Lawyers confront disruptive technologies by pretending they don’t exist, like those firms who advised clients to steer clear of cloud computing or the multitudes spending millions of client dollars to contort electronic data into printed, paginated documents.


‘Loose Tweets Sink Fleets’: How to Create Social Checks and Balances

'Loose Tweets Sink Fleets': How to Create Social Checks and Balances

As many have learned the hard way, placing information on a company intranet, extranet or the internet can open up a world of unintended consequences.


Multi-Tenant Data Architecture

Multi-Tenant Data Architecture

Trust, or the lack thereof, is the number one factor blocking the adoption of software as a service (SaaS). A case could be made that data is the most important asset of any business—data about products, customers, employees, suppliers, and more.


Taking a Multifaceted Approach to Cyber-Security

Taking a Multifaceted Approach to Cyber-Security

“It’s a chaotic and confusing environment. There are multiple threat vectors, increasingly sophisticated and effective attacks, and a general lack of security standards.”


HIPAA Data Breaches: What Covered Entities Must Know

HIPAA Data Breaches: What Covered Entities Must Know

Covered entities and their business associates need to understand the basics of how HIPAA data breaches are determined, and what they can do to keep information secure.


Why is Big Data so Dangerous?

Why is Big Data so Dangerous?

Big Data is one of the most potentially dangerous and destructive new technologies to come about in the last century. While a new fighter jet or a new type of bomb can certainly wreck havoc, big data has the potential to insidiously undermine and subtly (and not-so-subtly) change almost every aspect of modern life.


The Experts Speak: The Summer 2016 eDiscovery Business Confidence Survey Results

The Experts Speak: The Summer 2016 eDiscovery Business Confidence Survey Results

The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that impact the creation, delivery, and consumption of eDiscovery products and services.


Cloud Migration Dollars and Sense

Cloud Migration Dollars and Sense

The only times enterprises run into issues with cloud costs, deployment or other issues is when they try and completely “DIY.” Cloud may have radically democratized solution availability, but there are still complexities in the selection, installation and management process that should not be overlooked.