In “When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data,” Michael Ciaramitaro and Sarah Brown, both of Inventus, point out the number one vulnerability for most companies: “Organizations today rely heavily upon technology and electronically stored information – and when employees leave, there’s always a risk that they’ll take some information or data with them when they go, either inadvertently or on purpose.”
Topics: risk management, Differential Sharing, information security, unstructured data
In her 6/26/19 article for Legal Tech News, “Can Cloud Providers Calm Legal’s Apprehensions,” Victoria Hudgins, observes: “As cloud computing becomes more popular, some law firms and corporate legal departments aren’t jumping fully on the bandwagon.”
Topics: LegalTechnology, databreach, sensitive data, Differential Sharing, Data Security, cloud computing, unstructured data
Misery loves company, you could say, but when you are the guardian at the gate, this may be company you don’t want to keep. In “Highlights of Verizon’s 2019 Data Breach Investigations Report,” Sharon Nelson, takes on and highlights Verizon’s most recent survey. In short, the news is not good for anyone in general, and professionals in particular.
Topics: security, risk management, LegalIT, legaltecheducation, Differential Sharing, DBIR, Structured Data, Verizon Data Breach Investigations Report
Time for Courts and the Legal Profession to Jointly Adopt State-of-the-Art Infosecurity Solutions
The noted authority, Sharon D. Nelson, Esq., recently reported in her Ride the Lightning Blog: “Bank Sued Over Court Filing Containing Lawyers’ Personal Information,” a thorny bank litigation case that serves to highlight the critical importance of courts and litigators coming together to jointly adopt state-of-the-art infosecurity software and protocols.
Topics: Differentialsharing, compliance, cybersecurity, softwaresolutions, sensitive data, infosecurity, Differential Sharing, Court Documents