The digital devices, programs and processes law firms and legal departments use in their daily operations are ones upon which they have bestowed — many times passively — a level of trust and confidence. The security of a connected device, after all, is the first and sometimes only line of defense against breaches and cyberattacks anywhere in the network.
But how does one know that their technology is in fact the secure firewall it claims to be?
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Not a Bloomberg Law Subscriber?
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]