How to Practice Safe Online Habits and Make Cybersecurity a Priority
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…
Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all…
Following California's implementation of the California Consumer Privacy Act (CCPA) which took effect on January 1st, 2020. The state is…
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…
Understanding security compliance can be especially important for legal firms that represent banks, defense contractors and other financial institutions that…
California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018…
The SHIELD Act, Stop Hacks and Improve Electronic Data Security Act, which was signed in by New York's Governor on…
People across the nation are staying home, working remotely and practicing social distancing but that doesn't mean professional life as…
Third-party data is defined as any data collected from variety of sources by a company with no direct connection to…