• Secure Sharing Of Files Online

    A brief look at some off-the-shelf options for sending files and documents over the internet. All seven platforms reviewed here encrypt, but only one of them is not able access the files itself. All the others “retain...

    • Posted 1 week ago
    • 0
  • Phishing Has Succeeded At More Than Half Of U.S. Organizations

    More than half of U.S. organizations were successfully phished in 2019, meaning they lost data, faced a credential or account compromise, or a ransomware...

    • Posted 2 weeks ago
    • 0
  • Corporate Investigations: What A New Survey Tells Us

    Being subject to investigations has become a fact of corporate life, and investigations are expected to become more common, according to a recent survey of legal and compliance professionals. Among the drivers of this trend are increased...

    • Posted 2 weeks ago
    • 0
  • Mistakes Lawyers Make When Dealing With Reporters

    Whether a reporter wants a comment about a crisis or just wants to tap into your wisdom, you can make the most of the situation by keeping in mind a few basic rules. Number one, says this...

    • Posted 3 weeks ago
    • 0
  • Failure To Patch May Bring Liability, Scuttle Insurance Claims

    After the National Security Agency discovered a potentially devastating vulnerability in Microsoft Windows 10 and some other Microsoft releases, the company, earlier this month, released a patch that is said to fix it. A client alert from...

    • Posted 3 weeks ago
    • 0
  • Advanced Ransomware Infects Backups Too

    Ransomware, said in this article to be among the easiest threats to control (avoid opening suspicious emails) has an insidious offshoot. It’s been dubbed “wiperware” by security specialists; some call them “wiper worms.” These are sophisticated programs...

    • Posted 4 weeks ago
    • 0
  • Four Questions To Answer About New Privacy Regulations

    Many companies, and not just in California, as of January 1 became subject to The California Consumer Privacy Act. Those that didn’t should assume this law is almost certainly the first of a coming generation of privacy...

    • Posted 2 months ago
    • 0
  • Privilege Caution When In-House Attorney Is 30(b)(6) Witness

    In the Northern District of Illinois, a court ruled that a company must produce privileged documents that an in-house attorney used to refresh her memory prior to being deposed as a 30(b)(6) witness. The key here was...

    • Posted 2 months ago
    • 0
  • New Ransomware Threat: We’ll Broadcast Data You Won’t Buy Back

    Purveyors of a strain of malware called Maze Ransomware have added another term to their extortion deal. Not only will they freeze your computers if you don’t pay up, they will start publishing your data. This ploy...

    • Posted 2 months ago
    • 0
  • Managing Mountains of Data: Q&A with H5

    Identifying and retaining data that has business value is critical, but that same data can pose risks. Today’s General Counsel interviewed Sheila Mackay and Karla Wehbe of the technology services firm H5 on how to manage these...

    • Posted 2 months ago
    • 0
Do NOT follow this link or you will be banned from the site!