Pete Recommends – Weekly highlights on cyber security issues, December 24, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: The Trojan House Source: The Surveillance Technology Oversight Project; Google Takes Gmail Security to the Next Level with Client-Side Encryption; Hunting for Mastodon Servers; and ByteDance [aka TikTok] employees spied on U.S. journalists, audit finds.

Subjects: Business Research, Cybercrime, Cyberlaw, Cybersecurity, Free Speech, KM, Privacy, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 17, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Tricking antivirus solutions into deleting the wrong files on Windows; DOJ Seizes Dozens of Websites as Part of Cyberattack-for-Hire; TikTok pushes harmful content promoting eating disorders and self-harm into young users’ feeds; and FCC May Mandate Security Updates for Phones.

Subjects: Cybercrime, Cybersecurity, Food & Drug Law, Healthcare, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues, December 10, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Apple Commits to Encrypting iCloud, Drops Phone-Scanning Plans; Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds; Top EU court rules Google must delete inaccurate search results; and Who Is Collecting Data from Your Car?

Subjects: Cybercrime, Cybersecurity, Data Mining, Encryption, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, December 3, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 5 cybersecurity predictions for 2023; Cops Can Extract Data From 10,000 Different Car Models’ Infotainment Systems; A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet; and Thinking about taking your computer to the repair shop? Be very afraid.

Subjects: Big Data, Congress, Cybercrime, Cybersecurity, Email, Email Security, KM, Privacy, Search Engines, Search Strategies, Social Media, Spyware, Travel

10 fatal traps that explain why law firm strategic plans are DOA

Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to circumvent to establish a winning competitive position going forward.

Subjects: Communication Skills, Economy, Information Architecture, Information Management, KM, Law Firm Marketing, Leadership, Legal Profession, Management

For 2023, which tech tools might help your firm flourish?

Nicole L. Black’s actionable checklist begins with an end of year review of your law firm’s achievements and challenges to determine issues and new requirements moving forward. The review will include conducting an audit of your workflow and technology to identify process gaps and ensure efficiency and profitability in the new year. When the audit is completed, identify and implement technologies and service providers that will bridge the gaps identified and establish the foundation for success.

Subjects: Information Architecture, Information Management, KM, Legal Technology

LLRX November 2022 Issue

Articles and Columns for November 2022 10 fatal traps that explain why law firm strategic plans are DOA – Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to …

Subjects: KM

The national library endowment vision must evolve

The LibraryEndowment.org started around nine years ago. A national library endowment would reduce the inequalities of the U.S. library world, especially those tied to geography, class, and race. David H. Rothman shares his personal views on topline issues this project faces moving forward: how libraries could accept money from the super-rich while retaining their independence, and the increasing desirability of national digital library systems funded by the endowment, among other sources.

Subjects: Education, KM, Librarian Resources

Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.

Subjects: AI, Big Data, Blockchain, Congress, Criminal Law, Cryptocurrency, Cybercrime, Cybersecurity, Employment Law, Legal Research, Privacy