Why you need a second wall of data breach defense
With a growing number of data breaches initiated internally, device-level security is no longer adequate. Legal professionals can now raise a secondary wall of defense.
5 quick tips for better Android phone security right now
Keeping up with your firm’s Android phone security practices on the front end makes it a lot less likely you'll have to spend money after you run into trouble. Read [...]
Practice innovations: zero trust — never trust, always verify
How can you best secure your computers systems in today’s world? “Trust no one or anything — and always verify.”
To avoid insider cyber threats, try empathy
A CISO explains the importance of addressing insider threats and how to make sure your employees are aware of the problem.

Brought to you by BridgeTower Media