0 results for 'IBM'
Boutique Firm Focused on Data Breaches Launches in the Netherlands
The two founders named their new boutique firm seventytwo, a reference to the crucial first 72 hours after a company becomes aware of a cyber incident or breach.Some Small Firms Think They're Off the Radar for Cyberattacks. But They're Wrong
Some law firms don't protect themselves from cybercrimes because they don't appreciate the risks they face, while others think safety precautions are a nuisance. But a recent hacking incident at a New Jersey law firm has served as a reminder of the risks that cybercrime poses.Some Small Law Firms Think They're Not on the Radar for Cyberattacks—They're Wrong
Amid growing awareness of cybercrimes against law firms, a few lawyers are holdouts who remain unconvinced of the need to protect their practices from hacking, according to cybercrime experts.For Legal, More Emails Means More Stress—And More Cyberrisk
As employees work in a home environment filled with distractions and stress, email mistakes are bound to happen. But limiting the cyber risk of those mistakes requires new tools that most industries haven't identified yet, according to a new survey.With Anticipated Cyberattacks, Protecting Data Breach Reports From Discovery
Cyber experts anticipate that, as a result of the COVID-19 pandemic and resulting vulnerabilities arising from organizations' need to rollout a remote work environment overnight, many organizations' systems already have been compromised and that those incidents will surface during the fourth quarter of 2020.Prepare for Slower Data Breach Detection, Higher Costs With Remote Workforce
The major exodus of employees to remote working environments will spread corporate data across various privately owned electronics and services, and likely hinder data incident monitoring and compliance.Nervous System: The Police Beat Algorithm and Automated Criminal Justice Information Systems
This month's lesson on the history of cybersecurity looks at the use of computer technology to predict crime and allocate police resources—and the lasting legacies that have resulted.In Cannabis Industry, Profitability and Data Security Go Hand-in-Hand
The issues surrounding legalized cannabis and data security create a multi-front battle that can be incredibly challenging from a legal and technological perspective.Nervous System: How Punch Cards Brought Us to Our Census
Today is Census Day, with the ability to submit information online and the use of sophisticated database technology to derive statistics from raw counts. But for more than a century, punch card automation was perhaps the most remarkable longevity of anything in computer science.Epiq's Client-Facing Systems Back Online After Ransomware Attack
In late February, Epiq took its global systems offline after being hit with a ransomware attack. Now systems are back up and running with "hardening measures" around the company's cybersecurity.Corporate Transparency Act Resource Kit
Brought to you by Wolters Kluwer
Download Now
Revenue, Profit, Cash: Managing Law Firms for Success
Brought to you by Juris Ledger
Download Now
Law Firm Operational Considerations for the Corporate Transparency Act
Brought to you by Wolters Kluwer
Download Now
The Ultimate Guide to Remote Legal Work
Brought to you by Filevine
Download Now