Posts Tagged information security

Printers invaluable but can be targeted by hackers

Welcome to part two in a two-part series on the role of printers in law firms. In the first instalment, we discussed what firms want in printers. Today we’ll look at keeping printers safe from hackers. Today’s printers offer law firms brilliant labour-saving features. Unfortunately, many of

Read more

In a digital world, paper still matters to law firms

Chuck Rothman has heard of law firms whose offices could be cited by the fire marshal. “They have bankers boxes lining every hallway,” he said. Rothman hastened to add that few firms he’s encountered in his role as director of e-discovery services with information governance, e-discovery and

Read more

Right tools crucial to keep mobile data safe

Brock Smith’s clients regularly send him documents to sign using tools like DocuSign or Adobe Acrobat’s signing feature. The partner at B.C.-based Whiteboard Law also acts as a part-time general counsel for a technology company. He is an authorized user of both their systems and Whiteboard’s. And

Read more

The consequences of forwarding suspicious emails

An acquaintance recently asked me if I had blocked her email address. I was puzzled. She said she received a message from my email service that said her message was blocked. When we talked this through, I began to understand what must have happened.

Read more

Finding a fit for virtual desktops in your firm

Computer users typically keep the software and data they use on their computers. About five years ago, Will Davidson LLP began to access both software and data located on company servers using virtual desktop infrastructure (VDI). Partner Paul Cahill rebels against this change to this day. Virtual

Read more

Troubleshooting a Mac: Beware of Third-Party Utilities

In early June, I gave a one-hour workshop at the Vancouver Editors Canada conference. I spoke about Inbox Zero, the lack of which can be a drag on productivity. Two things happened at this conference that triggered my dreaming up a series of blog posts, the first of which you’re now reading.

Read more

What a phone scam sounds like

Hearing messages like the one in this post annoys me. Before I go into my bullet-pointed rant, click the link below to listen to a 40-second recording I made of a voice mail message early this spring (my apologies for the rough audio quality, but it is all understandable):

Read more

Mobile devices gaining importance in probes

Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can

Read more

Terms and Conditions May Apply

Ever wonder what happens when you agree to the end user licence agreements (or EULAs) that you must abide by to use modern technology? This past weekend, I watched a documentary that explores the chain of events you set in motion when you click things like the “Submit” button

Read more

Hosted solutions shift expenses away

  This is the second instalment in a two-part series in The Lawyers Weekly offering basic advice to law firms that want to make cost-effective technology decisions. This time, we’ll look at hosted solutions. Businesses of all stripes use applications and data storage outside their own (fire)walls, and law

Read more
Page 1 of 1012345...10...Last »