What happens when the document comparison in your app isn’t reliable?

We talked to DocsCorp about our integration of their high fidelity Word document comparison in our LINK app. We used their compareDocs SDK. It was a success for us and for our legal clients. This post is from their blog site.

Picture this: you are a lawyer who relies heavily on your devices to work outside of office hours. Perhaps you use the morning commute to fire off emails from your smartphone, or maybe you use your tablet on the couch after everyone has gone to bed and the house is finally quiet. While working on these devices, you use a secure app made especially for legal professionals. It has everything you need – access to your document management system, advanced search, Word editing and annotation, and document comparison.

Read the rest on the DocsCorp blog

Is Your Email Vulnerable? Ask the Chinese Military

Image: ribkhan, Pixabay

I’m a current events junkie. I’ll admit it. And I work with law firms. Thus, my favorite podcast? “Stay Tuned with Preet.” Yes, this is Preet Bharara, the former U.S. Attorney for the Southern District of New York. Check out an episode. Preet takes a few questions about the law at the beginning of each episode. Then he has a guest. Preet is not only smart, but surprisingly personable. It’s a fast-moving hour.

A recent guest was John P. Carlin, former Assistant Attorney General for the National Security Division at the Department of Justice and Chief of Staff to Robert Mueller at the FBI. He is currently a partner with Morrison & Foerster. Carlin is an international cybersecurity expert.

One of the things which caught my attention in this episode was Carlin’s story of the US subsidiary of a German company whose data was stolen by hackers in the Chinese military. The company, SolarWorld, in Hillsboro, Oregon, made solar energy components.

How was the data stolen? Email. Carlin said, “Email. It is the least protected part of the system, usually. Not like Intellectual Property which is encrypted or where special measures are taken to protect it. They stole email traffic.”

Continue reading

ILTA Webinar: Mobile, Secure NetDocuments Workflows: NetDocuments® DMS + LINK Encrypted App

Do you use NetDocuments® DMS today or are you evaluating NetDocuments? If you are looking for an encrypted container app approach for mobile NetDocuments DMS, our LINK app may provide that extra client-side security that you are looking for.

Date and time: Monday, February 11, 2019, Noon EST

Watch a recording of the demo here

Continue reading

What Can You Do With the LINK App?

If a picture is worth a thousand words then a video is worth a few thousand?

Our LINK app is so visual that we like to SHOW what it does. This video shows how LINK enables workflows for lawyers, especially document comparison and annotation.

What Can You Do With the LINK App? 2:22 from LINK App by Mobile Helix on Vimeo.

ILTA Webinar, Dec. 10th: Data Loss Prevention on Mobile with Seth Hallem

Mobile devices are constantly transacting with sensitive corporate data. Historically, most of that traffic is emails and email attachments. Increasingly, attorneys want to do more on their mobile devices, including annotating and editing documents. Much time and energy has been invested in DLP on the desktop, but what is the state of the art in mobile?

Continue reading

Mobile Helix at ILTACON August 2018

Gaylord National Front Entrance

Stop by booth 930 to see a quick demo of LINK. We will be showing easy mobile workflows like these:

  • Open a DMS link in Email, view tracked changes, then view with tracked changes accepted

  • Compare an attachment in Email to a document in DMS, edit or annotate, check-in to DMS

  • Use in-app annotation to mark up a document to share with a colleague or client

  • Import an attachment into DMS

  • Edit with the MS Word App, check the new document into DMS

LINK gives you easy and secure access to documents in iManage®, NetDocuments®, OneDrive for Business, SharePoint libraries and even in your Home Directory on the firm network.

LINK is a secure container app which can be remotely wiped. Data is encrypted at-rest and in-transit. LINK includes built-in biometric (or PIN code) 2F for quick, secure authentication.

August 19-23, 2018, at the Gaylord National Resort, National Harbor, MD

 

Annotation LINK 3.4.106

register-here-blue

Secure Email is Cracked; What Now?

cracked pixabay rotated broken-glass-2208593__480

By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect

Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email? 

On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.

What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.

The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.

Continue reading