Boost Employee Awareness and Lower Your Insurance Premium
Cybercrime is a common part of business these days. Even if you haven’t encountered a hacking or malware incident at your business in recent years, the fact is that cybercriminals are coming up with...
It’s Data Privacy Day… Do You Know Where Your Data Is?
If you’re not doing everything in your power to protect your data, you’re leaving your most valuable business asset open to cybercriminals! January 28th, 2018 is Data Privacy Day, an international...
Three Surprising Cybersecurity Mistakes Law Firms Make
Law firms once considered themselves to be immune from cyber attacks. However, this is no longer true. In fact, last year alone, cyber attacks against law firms increased. One report estimated that...
Legal IT: Will Machines Take Over the World?
This is what people sometimes say when you start talking about machine language and artificial intelligence. Though it’s true that a computer can perform long, complex mathematical computations, it...
The Future of Big Data and the Legal Industry
There’s no doubt that Big Data, Data Mining, and Machine Learning have changed every industry on the planet. Recent political campaigns were won by experts who knew how to use all data available...
Evolving PCI DSS 3.2 Requirements Become Mandatory on February 1, 2018
The latest updates from the Payment Card Industry Data Security Standard, known as PCI DSS 3.2, will become mandatory on February 1, 2018. This will affect all merchants and service providers who...
When Is It Time To Think About Replacing My Aging Server?
Server hardware is the backbone of all that you do in your business. With the appropriate hardware, your company can remain competitive in a world dominated by tech. Needs such as connected devices,...
Major Security Flaw Discovered In Intel Processors
Potentially every Intel processor sold in the last 10 years could have a critical security vulnerability that puts users at severe risk. It’s often these days that poor IT security comes down to...
What You Need to Know About “Meltdown” and “Spectre.”
Two critical vulnerabilities were found in Intel chips that could result in a malicious attacker stealing your data, such as photos, emails, documents, browsers, and password managers. How can this...
How Scammers Use Familiar Phone Numbers to Steal Your Information
Scam phone calls aren’t a new thing, but today’s scammers are now bolder and more sophisticated. In 2010, more than 84,000 people reported phone-related scams to the Federal Trade Commission (FTC)....
5 Tips For Avoiding Tax-Related Identity And Data Theft
Theft and fraud are serious causes for concern both in and out of the office, which makes education and awareness on the subject crucial. Cybercrime comes in many forms and uses many different...
Why You Should Create a Business Continuity Plan For 2018
Data loss is always a concern for businesses, and now with cloud storage, there’s more of a concern than ever before. “It can’t/won’t happen to me” attitudes among small businesses often end in...