Ryan Fahey at InfoSec Institute sent me an article about security tips for Android phones. After I read it, I realized the title of the article implies a scope much narrower than the article offers. The tips in this article go beyond just Android – they apply to
Read more →My favorite way to research is to ask questions of subject matter experts. They take you right to the core of a topic and help you consider angles you didn’t know about. My second-favorite way to research is to read documents online and pull text from them
Read more →What to look for in a provider’s service-level agreements Lawyers who want to use the cloud to meet their computing needs find themselves whipsawed. Cloud service providers promise up-to-date systems, great features and manageable IT costs. But questions stemming from professional responsibilities, such as privacy and confidentiality,
Read more →Law firms handle plenty of sensitive information, both their own and that of their clients. A client’s competitor and opponents in a lawsuit are just two parties who may want to steal that information. “Security matters because it is not a theoretical risk,” says Martin Felsky, a
Read more →In the media, a topic is said to have legs when it recurs regularly. I know journalists who cover different stories on the same topic and reuse paragraphs in the middle of each story because the basic facts don’t change. Password leaks committed by major organizations is
Read more →No matter which way you turn, chances are you use some type of technology during your workday. Here are some tips to help you keep that technology serving you well.
Read more →I’ve always hated the term “laptop” when applied to computers. Now somebody else has created an infographic that helps to explain why, while also providing a bunch of tips people need to understand when it comes to keeping their notebook computers safe. Thanks to Sydney Patterson at
Read more →