While Preparing for the Whyte Walkers, Hackers Breach the Wall

The ongoing saga of the HBO data hack demonstrates the challenges of protecting the myriad types and locations of sensitive data in today’s digital environment. With data breaches happening more often, and with every type of business at risk, companies must go beyond standard InfoSec practices to identify and protect sensitive data. The HBO hack and other similar breaches demonstrate that, despite the increased focus on data security, it still isn’t enough.

Sensitive Data in E-Discovery: Find It, Cull It, Protect It

As volumes of electronically stored information increase, more and more sensitive data finds its way into ESI collected for legal matters, and it’s becoming increasingly difficult for organizations to effectively protect sensitive data in discovery. We explore some specific measures to protect sensitive data that can be incorporated into e-discovery project workflows. Learn how to find it, cull it, and protect your client's or organizations's sensitive data in e-discovery.

Survey Says? Not Ready for GDPR

With all this attention, shouldn't we assume that every organization subject to the GDPR—which is quite a broad group—is diligently preparing? After all, the GDPR goes into effect in May 2018, less than a year from now. Is your organization going to be compliant before the GDPR regulations take effect?

Preparing for GDPR Compliance: We Get by with a Little Help from Our (Law Firm) Friends

Are you prepared for the GDPR compliance? The General Data Protection Regulation goes into effect in less than a year, May 25, 2018. Don't worry, Maureen has gathered some of the most helpful GDPR resources published by law firms to help align your organization with GDPR compliance.

Some InfoSec Guidance for In-House and Outside Counsel: ACC Issues its “Model Information Protection and Security Controls”

Previously, we’ve explored the ever-increasing information security risks faced by law firms, which hold some of their clients’ most sensitive and confidential information. This week, one of the world’s largest and most respected law firms fell victim to a ransomware attack, shutting down its entire computer network system for several days. The Model Controls address thirteen areas of security measures which are designed to serve as a list of baseline security measures that corporate counsel may consider requiring its outside law firms to implement.