In the investigations of Paul Manafort and Michael Cohen, the FBI has retrieved messages from Signal, Telegram and WhatsApp. While there are weaknesses inherent in all of these apps, the question remains: What does a good data protection scheme look like?
A few days ago, the FBI revealed that Michael Cohen’s messages sent with Signal and WhatsApp
are now available as evidence in the on-going investigation into his
various dealings. While thousands of emails and documents have already
been recovered from Cohen’s devices, home, hotel room, and office, the
recovery of data from messaging apps that promise end-to-end encryption
is surprising. One would presume that end-to-end message encryption
should ensure that those messages are unrecoverable without assistance
from Mr. Cohen. However, clearly that is not the case.
By Mobile Helix CEO & Co-founder, Seth Hallem in Legal IT Professionals
A good lawyer helps you see around the bend. In my experience over the years as a client, I have found that each time my attorney points out something in a contract or business decision that I had not anticipated, I ignore the next bill when it comes in and I pay it gladly. When I feel that my attorney is simply a contract factory, I look at each bill closely and start to wonder if there is a better way.
I recently had this experience with my company’s attorney and, as has become my custom, I did not pay any attention to the forthcoming invoice. I did, however, stop to think about how my company, as a legal technology provider, could facilitate more such interactions for our customers and their clients.
A few months ago, I read an article summarizing a survey conducted by
Clio. The headline of this survey is that lawyers bill only 2.3 of
every 8 working hours, instead spending the plurality of their day on
administrative tasks. This article jogged my memory of another article
from the American Psychological Association (APA) that outlined the
significant productivity lost due to context switching and distractions.
If my attorney is to be a source of insight, he or she cannot be
compromised by distractions that lessen her effectiveness.
By Mobile Helix CEO and Co-founder, Seth Hallem
Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.
Our CEO, Seth Hallem, spoke at the NetDocuments executive summit, ndElevate 2017, on May 23rd.
Seth’s presentation focused on three actionable ways for law firms, and any enterprise, to protect client-side data. We are sharing his slides from ndElevate below. If you have any comments or questions, we’d welcome hearing from you. Please write to contact at mobilehelix.com.
Thank you to NetDocuments for an excellent summit!