X

data security

How to Practice Safe Online Habits and Make Cybersecurity a Priority

All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…

Revisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care

Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…

Securing Data Through End To End Encryption (E2EE)

True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all…

California Privacy Rights Act (CPRA) Brings Focus to Data Minimization

Following California's implementation of the California Consumer Privacy Act (CCPA) which took effect on January 1st, 2020. The state is…

What Is FTP And Why Is It Secure?

File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…

What Legal Professionals Need to Know About the Importance of SOC 2 Compliance

Understanding security compliance can be especially important for legal firms that represent banks, defense contractors and other financial institutions that…

Approved Final Set of California Consumer Privacy Act (CCPA) Regulations Now in Effect

California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018…

Overview of The New York SHIELD Act – Data & Privacy Laws

The SHIELD Act, Stop Hacks and Improve Electronic Data Security Act, which was signed in by New York's Governor on…

VPN & Remote Desktop Security More Important Now Than Ever

People across the nation are staying home, working remotely and practicing social distancing but that doesn't mean professional life as…

Controlling Third-Party Data

Third-party data is defined as any data collected from variety of sources by a company with no direct connection to…