Posts Tagged information security

Right tools crucial to keep mobile data safe

Brock Smith’s clients regularly send him documents to sign using tools like DocuSign or Adobe Acrobat’s signing feature. The partner at B.C.-based Whiteboard Law also acts as a part-time general counsel for a technology company. He is an authorized user of both their systems and Whiteboard’s. And

Read more

The consequences of forwarding suspicious emails

An acquaintance recently asked me if I had blocked her email address. I was puzzled. She said she received a message from my email service that said her message was blocked. When we talked this through, I began to understand what must have happened.

Read more

Finding a fit for virtual desktops in your firm

Computer users typically keep the software and data they use on their computers. About five years ago, Will Davidson LLP began to access both software and data located on company servers using virtual desktop infrastructure (VDI). Partner Paul Cahill rebels against this change to this day. Virtual

Read more

Troubleshooting a Mac: Beware of Third-Party Utilities

In early June, I gave a one-hour workshop at the Vancouver Editors Canada conference. I spoke about Inbox Zero, the lack of which can be a drag on productivity. Two things happened at this conference that triggered my dreaming up a series of blog posts, the first of which you’re now reading.

Read more

What a phone scam sounds like

Hearing messages like the one in this post annoys me. Before I go into my bullet-pointed rant, click the link below to listen to a 40-second recording I made of a voice mail message early this spring (my apologies for the rough audio quality, but it is all understandable):

Read more

Mobile devices gaining importance in probes

Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can

Read more

Terms and Conditions May Apply

Ever wonder what happens when you agree to the end user licence agreements (or EULAs) that you must abide by to use modern technology? This past weekend, I watched a documentary that explores the chain of events you set in motion when you click things like the “Submit” button

Read more

Hosted solutions shift expenses away

  This is the second instalment in a two-part series in The Lawyers Weekly offering basic advice to law firms that want to make cost-effective technology decisions. This time, we’ll look at hosted solutions. Businesses of all stripes use applications and data storage outside their own (fire)walls, and law

Read more

Prevent unwanted software activity on your computer

All types of malware, from viruses to trojan horses to bots and so on, aren’t particularly mysterious. They’re merely pieces of software. They worry people since they do things to computers their owners don’t want done. Security-conscious computer users have already adopted good habits. They don’t click

Read more

Beacon technology finding footing in Canada

Smartphone-toting film, music and technology fanatics who converged on Austin, Texas, in March for South by Southwest (SXSW) got to connect with the festival and each other a little better than in previous years. The SXSW Go mobile app responded to more than 1,000 beacons deployed at event

Read more
Page 1 of 912345...Last »