Category «Computer Security»

The 6 Types Of Cyber Attacks To Protect Against In 2018

Lizzie Kardon’s article is a timely guide to the different methods by which cyber attacks are launched and the tools used to deliver them. As the goals and objectives for such attacks differ, it is critical to employ accurate and effective strategic and tactical processes to prevent and to repel attacks that are steadily increasing as the Internet of Things (IoT) expands in arenas that span work, home, government, social media, healthcare and beyond.

Subjects: Computer Security, Cybercrime, Cybersecurity

Pete Recommends – Weekly highlights on cyber security issues July 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the Supreme Court struggles to define ‘searches’ as technology changes, and how Google employees avoid phishing attempts with a $20 YubiKey security key.

Subjects: Computer Security, Cybersecurity, Email Security, Healthcare, Privacy, Social Media

Pete recommends – weekly highlights on cyber security issues – February 16 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis, Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness.

Subjects: Computer Security, Cybercrime, Cybersecurity, Government Resources

Privacy Resources and Sites on the Internet

Marcus P. Zillman’s guide is a comprehensive listing of both free and low cost privacy resources currently available on the Internet. It includes associations, indexes and search engines, as well as websites and programs that provide the latest technology and information on Web privacy. This guide will help facilitate a safer interactive environment for your email, your internet browsing, your health records, your data storage and file sharing exchanges, and internet telephony.

Subjects: Computer Security, Email, Email Security, Internet Resources, Internet Resources - Web Links, Legal Research, Legal Technology, Mobile Tech, Privacy, Search Engines

Cloud Computing for Lawyers

This is Nicole L. Black’s primer for the legal profession on an emerging technology which is defined as a “type of computing that is comparable to grid computing, [and] relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of cloud computing is to apply traditional supercomputing power (normally used by military and research facilities) to perform tens of trillions of computations per second.”

Subjects: Computer Security, Digital Archives, Information Management, Internet Trends, Law Firm Marketing, Open Source, Technology Trends

Conrad Jacoby’s E-Discovery Update: Minimizing E-Mail Archive Data Conversion Issues

According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.

Subjects: Case Management, Computer Security, Conflicts, Digital Archives, Disaster Planning, Discovery, E-Discovery, Email, Email Security, Information Architecture