How to Practice Safe Online Habits and Make Cybersecurity a Priority
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…
Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…
If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association's Cybersecurity…
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…
California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018…
Video-teleconferencing (VTC) have become a pivotal aspect of connectivity in wake of the COVID-19 crisis. As a result, reports of…
Third-party data is defined as any data collected from variety of sources by a company with no direct connection to…
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…
As legal technology and advancements within areas such as cloud technology and software-as-a-service, clients are facing increased pressure to make…
What does this ruling mean with respect to your company (or your client)? Extract from an article by Tom Kulik…