Category «Email»

Pete Recommends – Weekly highlights on cybersecurity issues – October 2, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Google Rolls out ‘Results About You’ for Personal Info Removal; I Said No to Online Cookies. Websites Tracked Me Anyway; Bosses spying on you? Here’s the most disastrous truth about surveillance software; How does identity crime affect victims?; and Say Goodbye to VPNs.

Subjects: AI, Cybercrime, Cybersecurity, E-Commerce, Email, Privacy, Technology Trends, Telecommuting

Cybercrime and Digital Transformation

Cybercrime is on the rise all around the world. As more companies adopt technology such as artificial intelligence (AI), big data, and cloud computing, they become more vulnerable to hackers who want to gain access to the valuable information stored on their systems. It is estimated that cybercrime costs companies over £3.1 billion in 2020 alone on a global level. Imran Zaman, an expert on Digital Disruption with Fortune 500 companies, advises regardless of whether you are a large corporation or a small business, cybercrime is something everyone needs to be concerned about in the Age of Digital Transformation.

Subjects: AI, Big Data, Blockchain, Computer Security, Cybercrime, Cybersecurity, Email, Email Security, Firewalls, Privacy, Software, Spyware

Pete Recommends – Weekly highlights on cyber security issues, October 31, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: You can now remove pictures of minors from Google Search — here’s how; The Identity Theft Resource Center’s Inaugural 2021 Business Aftermath Report; and Millions Of Patient Health Records Now At Risk Through Unregulated API’s.

Subjects: Cybercrime, Cybersecurity, Email, Email Security, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues, June 6, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Two New Laws Restrict Police Use of DNA Search Method; On the Taxonomy and Evolution of Ransomware; Amazon’s Ring Finally Discloses Police Requests; and The Limits of Law and AI.

Subjects: AI, Civil Liberties, Communications, Criminal Law, Cybersecurity, Email, Gadgets/Gizmos, Legal Research, Privacy

How to Identify a Phishing Attempt and Thwart It

There has been a huge surge in phishing attacks and swindles during the COVID-19 pandemic as more people are working remotely. The attacks and scams have been perpetrated against businesses and individuals alike. Catherine Sanders Reach talks about the increased importance for lawyers and their teams in the office or working from home to understand the threats, and how to actively engage in efforts to reduce both individual and enterprise wide exposure.

Subjects: Cybercrime, Cybersecurity, Email, Email Security, Law Firm Security, Privacy

Finding Email Addresses

Across most sectors, customer support is no longer provided by human contacts but rather leads customers into endless telephone loops of menus, dealing with chatbots, or receiving emails from “no-reply” addresses. Finding email addresses for actual people is very difficult but Michael Ravnitzky’s article features proven tools and techniques to locate and use the email address of individuals within organizations who should be responding to your issues and complaints and providing you with a satisfactory resolution.

Subjects: AI, Business Research, E-Commerce, Email, Search Engines, Search Strategies

Pete Recommends – Weekly highlights on cyber security issues, August 8, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: This Tool Could Protect Your Photos From Facial Recognition; NSA Releases Guidance on Limiting Location Data Exposure; Lawsuit claims TikTok steals kids’ data and sends it to China; and Data isn’t just being collected from your phone. It’s being used to score you.

Subjects: AI, Big Data, Cybercrime, Cybersecurity, Email, Email Security, KM, Legal Research, Privacy

Business as (Un)Usual: Library Business Continuity Amid COVID-19

Ellyssa Valenti Kroski, Director of Information Technology/Marketing, The New York Law Institute, shares proactive steps her organization took to transition to a remote workplace during the pandemic, the technology and processes they implemented, and important tips for preparing your own library.

Subjects: Email, Email Security, Healthcare, KM, Law Library Management, Legal Research, Legal Technology, Libraries & Librarians, Management, Mobile Technology, Telecommuting

Pete Recommends – Weekly highlights on cyber security issues February 1, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Ring Doorbell App Packed with Third-Party Trackers; How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence; Jeff Bezos Phone Hacking – WhatsApp Hack – Is WhatsApp Safe?; and 8 cities that have been crippled by cyberattacks — and what they did to fight them.

Subjects: Congress, Cybercrime, Cybersecurity, E-Discovery, Election Law, Email, Email Security, Encryption, Firewalls, Gadgets/Gizmos, Intellectual Property, Privacy

Automation in MS Outlook

This guide by legal tech expert Catherine (Sanders) Reach is a must-read for every Outlook user seeking to implement value added features and functions that are currently underused, or not used at all. Many of us spend a good portion of our day in Outlook, receiving and responding to email, sending and filing attachments, scheduling appointments, responding to meetings, and updating contacts. Sanders Reach identifies key shortcuts, tools and techniques already built into application, as well as third-party add-ins, to help manage your communications much more effectively.

Subjects: Case Management, Communications, Contact Management, Email