ILTA Webinar, Dec. 10th: Data Loss Prevention on Mobile with Seth Hallem

Mobile devices are constantly transacting with sensitive corporate data. Historically, most of that traffic is emails and email attachments. Increasingly, attorneys want to do more on their mobile devices, including annotating and editing documents. Much time and energy has been invested in DLP on the desktop, but what is the state of the art in mobile?

Continue reading

Mobile Helix at ILTACON August 2018

Gaylord National Front Entrance

Stop by booth 930 to see a quick demo of LINK. We will be showing easy mobile workflows like these:

  • Open a DMS link in Email, view tracked changes, then view with tracked changes accepted

  • Compare an attachment in Email to a document in DMS, edit or annotate, check-in to DMS

  • Use in-app annotation to mark up a document to share with a colleague or client

  • Import an attachment into DMS

  • Edit with the MS Word App, check the new document into DMS

LINK gives you easy and secure access to documents in iManage®, NetDocuments®, OneDrive for Business, SharePoint libraries and even in your Home Directory on the firm network.

LINK is a secure container app which can be remotely wiped. Data is encrypted at-rest and in-transit. LINK includes built-in biometric (or PIN code) 2F for quick, secure authentication.

August 19-23, 2018, at the Gaylord National Resort, National Harbor, MD

 

Annotation LINK 3.4.106

register-here-blue

Our CEO in CSO: Ripped from the headlines – are your messages secure in these encrypted apps?

In the investigations of Paul Manafort and Michael Cohen, the FBI has retrieved messages from Signal, Telegram and WhatsApp. While there are weaknesses inherent in all of these apps, the question remains: What does a good data protection scheme look like?

 

A few days ago, the FBI revealed that Michael Cohen’s messages sent with Signal and WhatsApp are now available as evidence in the on-going investigation into his various dealings. While thousands of emails and documents have already been recovered from Cohen’s devices, home, hotel room, and office, the recovery of data from messaging apps that promise end-to-end encryption is surprising. One would presume that end-to-end message encryption should ensure that those messages are unrecoverable without assistance from Mr. Cohen. However, clearly that is not the case.

Continue reading

Secure Email is Cracked; What Now?

cracked pixabay rotated broken-glass-2208593__480

By Seth Hallem, Moble Helix CEO, Co-founder, & Chief Architect

Secure email using S/MIME and OpenPGP is fundamentally broken. Our CEO explains the EFAIL vulnerability and why our LINK Email is not susceptible to EFAIL. What do we do next to protect email? 

On Sunday night, a team of researchers from Germany and Belgium dropped a major bomb on the world of encrypted email by describing a simple, widely applicable, and wildly effective technique for coercing email clients to release encrypted email contents through “Exfiltration channels.”[1] The concept is simple – by using a combination of known manipulation techniques against the encryption algorithms specified in the S/MIME and OpenPGP standards and lax security choices in a wide variety of email clients, the research team was able to intercept and manipulate encrypted emails such that large blocks of the encrypted text are revealed to a malicious server.

What is most brilliant (and most dangerous) about this attack, is that the attack does not require decrypting the email messages or stealing encryption keys. Hence, the attack can be deployed as a man-in-the-middle attack on the infrastructure of the internet itself, rather than requiring that a specific email server or email client is compromised.

The essential idea behind this attack is simple – HTML emails expose a variety of reasons to query remote servers to load parts of those emails. The simplest (and most common) example of this concept is displaying embedded images. Many marketing emails use tiny embedded images to monitor who has opened an email. This technique is so pervasive that many of us have become desensitized to clicking the “Allow images from this sender” prompt in Outlook. It is common practice for marketing emails to contain embedded images with essential content, which encourages users to allow the client to load all images in that message. However, doing so loads both visible images and tiny, single pixel images that marketing tools use to uniquely determine that we have opened the email message in question.

Continue reading

CodeX FutureLaw 2018 Conference – Innovation Under the Redwoods

Last week I attended the sixth annual CodeX FutureLaw Conference, under the canopy of the redwoods on the Stanford University campus. I did not know entirely what to expect, but as my office is a few miles down El Camino Real from Stanford, I thought that it was worth investigating. I found the event to be stimulating and I would like to share what I  learned so that others may consider attending FutureLaw in the future.

What is CodeX? It is a Stanford group, associated with the Law School, whose mission is to create legal technology that empowers all parties. It is ably headed up by Dr. Roland Vogl.

Continue reading

AI? What about NI? Enhancing Natural Intelligence Makes Better Lawyers

By Mobile Helix CEO & Co-founder, Seth Hallem in Legal IT Professionals

Seth HallemA good lawyer helps you see around the bend. In my experience over the years as a client, I have found that each time my attorney points out something in a contract or business decision that I had not anticipated, I ignore the next bill when it comes in and I pay it gladly. When I feel that my attorney is simply a contract factory, I look at each bill closely and start to wonder if there is a better way.

I recently had this experience with my company’s attorney and, as has become my custom, I did not pay any attention to the forthcoming invoice. I did, however, stop to think about how my company, as a legal technology provider, could facilitate more such interactions for our customers and their clients.

Bend fog tyler-lastovich-371909-unsplash.jpg

A few months ago, I read an article summarizing a survey conducted by Clio. The headline of this survey is that lawyers bill only 2.3 of every 8 working hours, instead spending the plurality of their day on administrative tasks. This article jogged my memory of another article from the American Psychological Association (APA) that outlined the significant productivity lost due to context switching and distractions. If my attorney is to be a source of insight, he or she cannot be compromised by distractions that lessen her effectiveness.

Continue reading

ILTA Webinar: Mobility for Lawyers – Greater Productivity and Ease of Use

Mobility is progressing rapidly. In the past 6 months, with our 3.4 release, our LINK app has added capabilities that enable lawyers to be truly responsive and productive from tablets and smartphones. 

View the recording of the webinar here. 

Continue reading