Cybersecurity

How to Actually Protect Privilege Blog

How to Actually Protect Privilege: A Practical Guide

How to Actually Protect Privilege: A Practical Guide 1251 835 Amanda Fong

Protecting Privilege Series / Part Three of Three We’ve explored why privilege protection matters in Part 1 of this blog series and examined what happens when it fails in Part 2. Now let’s talk about solutions. While technology created many of these risks, it can also solve them. With the right precautions and workflows, you…

read more
When Privilege Protection Goes Wrong Blog

When Privilege Protection Goes Wrong: Lessons from the Courtroom

When Privilege Protection Goes Wrong: Lessons from the Courtroom 1251 835 Amanda Fong

Protecting Privilege Series / Part Two of Three Even clear rules can’t save you from a privilege disaster if your workflows fall short. In this second part of our series, we examine two real-world cases where simple mistakes — like unsecured links and missed deadlines — led to costly privilege waivers. The Birth of Rule…

read more
High Stakes of Attorney Client Privilege BLOG

The High Stakes of Attorney-Client Privilege in the Digital Age

The High Stakes of Attorney-Client Privilege in the Digital Age 1251 835 Amanda Fong

Protecting Privilege Series / Part One of Three In today’s digital-first legal world, safeguarding attorney-client privilege is more challenging than ever. This first part explores the high stakes of privilege protection, why the rules differ across jurisdictions, and what’s at risk when even one mistake is made. Picture this: You’re in the middle of a…

read more
Navigating the AI Revolution Key Discovery Points Blog

Navigating the AI Revolution in Legal Practice: Essential Insights for Modern Practitioners

Navigating the AI Revolution in Legal Practice: Essential Insights for Modern Practitioners 1251 835 Amanda Fong

Artificial intelligence is rewriting the rules of legal practice. In our Key Discovery Points video series, Brett Burney and Doug Austin unpack recent case law, court rulings, and real-world examples to reveal what lawyers need to know when bringing AI in legal practice into the courtroom and beyond. AI’s New Era in Law Artificial intelligence…

read more
Legal software Canada and California expansion

Nextpoint Expands Secure Data Hosting to New Regions Across North America

Nextpoint Expands Secure Data Hosting to New Regions Across North America 1200 700 Elizabeth Guthrie

Nextpoint launches new developments for legal software in Canada and California amidst recent changes to data privacy and security laws. In May 2022, Nextpoint will begin hosting data on AWS servers in California and Canada, in addition to our current location on the East Coast. This will ensure our users can meet data privacy standards…

read more
Ransomware Attack Cybersecurity

A Message on Cybersecurity from CEO, Rakesh Madhava

A Message on Cybersecurity from CEO, Rakesh Madhava 1920 1280 Rakesh Madhava

To All Nextpoint Clients: After the news that Epiq Global had suffered a ransomware attack, it is appropriate that many will have data security at top of mind, and may be curious about Nextpoint security provisioning. Our sincere sympathies go out to our clients who have been affected as well as to the staff of…

read more

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know 150 150 Rakesh Madhava

On January 3, 2018, two hardware-related vulnerabilities, named Meltdown and Spectre (https://meltdownattack.com/ ), were disclosed by security researchers, which together affect a high proportion of all computers and mobile devices built within the last 20 years. This discovery has impacted the technology industry as a whole, and the industry has mobilized in response. To date,…

read more
security for attorneys

5 Security Tips for Lawyers Working Online

5 Security Tips for Lawyers Working Online 1000 667 Michael Beumer

As long as attorney work requires access to the sensitive personal records of end clients, law firms will always be a top target for hackers. SaaS software typically offers greater security and less maintenance than locally installed products. But, users share some basic responsibility for keeping client data secure. As an attorney, this is part…

read more
Legal cloud security standards

LCCA Sets New Cloud Security Standards for Legal

LCCA Sets New Cloud Security Standards for Legal 1920 1080 Michael Beumer

Cybersecurity and protection of privileged client data are vital concerns in the legal industry. The ABA Model Rules impose a duty on lawyers to use reasonable efforts to prevent unauthorized access to client data and recently made related changes to address the advances of technology. Today at ABA TECHSHOW, leaders from six legal cloud computing…

read more
Legal cloud security standards

Nextpoint Drafts Cloud Security Standards for Law Firms

Nextpoint Drafts Cloud Security Standards for Law Firms 1920 1080 Michael Beumer

Nearly a decade after we moved our eDiscovery platform to Amazon Web Services, making it accessible from anywhere without expensive infrastructure, it’s become increasingly common for law firms to manage their clients’ data in the cloud. Yesterday, leaders from six legal cloud computing providers – known collectively as the Legal Cloud Computing Association – released…

read more