New privacy software offers defense against pixel, tracker, and session recording lawsuits
Law firms with data privacy practices are seeing a substantial uptick in questions from clients concerned with data privacy violations related to website tracking. Read more www.lawtechnologytoday.org
Phishing and email scams hitting law firms
Several law firm consultants describe the phishing or scam messages they could have fallen for. Read more www.lawtechnologytoday.org
Cyber Security: As hacks increase, law firms should guard their weak spots
Cyber Security: As hacks increase, law firms should guard their weak spots By Carl Mazzanti Law firms are increasingly getting attention from a group they would rather avoid: cyber criminals. [...]
Law firm data breaches surge in 2023
Cybercriminals appear to be successfully hitting both small and large firms. Class action firms have discovered fertile ground in law firm data breaches. Read more at abovethelaw.com
Cybersecurity: Safeguarding law firm data with cyber security training
Cybersecurity: Safeguarding law firm data with cyber security training By Carl Mazzanti Cyber-criminals love law firms because they represent a treasure trove of information. That really hit home last year [...]
Surveilling your employees could be putting your firm at risk
EPST (Employee productivity surveillance technology) has become increasingly popular with the transition to remote and hybrid work, but it could create employee resentment and security risks. Read more at www.helpnetsecurity.com
Proper cyber security tools deliver safety and improve productivity
Proper cyber security tools deliver safety and improve productivity By Carl Mazzanti The technology industry loves shiny new toys, but law firms need specialize to solve real-world problems. The challenge, [...]
Class action filed against law firm following data breach
A Pennsylvania man has filed a class action lawsuit against a Philadelphia law firm, alleging the company’s failings led to a data breach. Read more at topclassactions.com
Security by obscurity is not security
While the bad guys may not care about the substance of what you have in your files, they do care about the data. Security can be improved by something as [...]
Using just-in-time access to reduce cloud security risk
As more organizations migrate assets to the cloud, users with excessive permissions can expand the blast radius of an attack, leaving organizations open to all sorts of malicious activity. Read [...]

Brought to you by BridgeTower Media