By Mobile Helix CEO & Co-founder, Seth Hallem in Legal IT Professionals
A good lawyer helps you see around the bend. In my experience over the years as a client, I have found that each time my attorney points out something in a contract or business decision that I had not anticipated, I ignore the next bill when it comes in and I pay it gladly. When I feel that my attorney is simply a contract factory, I look at each bill closely and start to wonder if there is a better way.
I recently had this experience with my company’s attorney and, as has become my custom, I did not pay any attention to the forthcoming invoice. I did, however, stop to think about how my company, as a legal technology provider, could facilitate more such interactions for our customers and their clients.
Read the entire post in Legal IT Professionals
Mobility is progressing rapidly. In the past 6 months, with our 3.4 release, our LINK app has added capabilities that enable lawyers to be truly responsive and productive from tablets and smartphones.
View the recording of the webinar here.
By Mobile Helix CEO and Co-founder, Seth Hallem
Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.
As a wise man once said, the definition of insanity is to do the same thing over and over again while expecting a different result. The same could be said for the two main pillars of most organizations’ security strategies today: a strong perimeter (read firewalls, intrusion detection/prevention, spam filters, VPNs, etc.), and a desktop security suite (anti-virus). Clearly this is not working, so why do we keep doubling down on more and more sophisticated and expensive variations of the same thing?
Read the entire post at CSO Online
Join this co-hosted ILTA Product Briefing webinar on Feb. 5th to see a demo of NetDocuments’ Trusted Cloud Platform integrated with the LINK secure container app.
View the recorded webinar here.
Peripatetic lawyers, take note from Friday, 1/5/2018, in the Washington Post:
“U.S. customs agents conducted 60 percent more searches of travelers’ cellphones, laptops and other electronic devices during the government’s 2017 fiscal year, according to statistics released Friday by U.S. Customs and Border Protection (CBP).
The agency said it searched 30,200 devices but the inspections affected only 0.007 percent of the 397 million travelers — including American citizens as well as foreign visitors — who arrived from abroad during the 12-month period that ended Sept 30.”1
This brief article from Help Net Security, Top blacklisted Android and iOS apps by enterprises caught my eye this morning. The piece highlights a portion of the data from the new Appthority 3Q ’17 Enterprise Mobile Security Pulse Report, which you can download for free.
The Help Net Security article cites the apps blacklisted by enterprises for iOS and for Android, their “Risk Score” and the “Risk Driver.” IT professionals should take note, not only of the blacklisted apps but of the associated risks.