Verizon’s “Hacktivism” 2012 report analyzed 855 data security breaches in 2011, finding that both small and large businesses are experiencing the second highest data loss since the report’s inception in 2004. Written to help prevent future breaches in 2012, the report carefully breaks down and analyzes global data breach statistics from 2011 and offers recommended solutions. So…
read moreOne of our ongoing challenges has been to explain the obvious benefits of cloud computing in the legal environment. Judging from last week’s ABA Techshow in Chicago, it seems that the world has finally caught up. It was great to see other cloud computing vendors getting recognition, as well as meeting some of newcomers to…
read moreJosh Barrett recently noted on the Tablet Legal blog that lawyers don’t always seem to use many applications on their iPad. In talking to attorneys with a small, iPad-using firm, the attorneys noted that they only use one or two apps regularly. At first, this seemed shockingly low, but on further introspection, Josh realized he…
read moreLaw Technology News recently featured a great article by technology editor Sean Doherty called “Bring Your Own Device to the Law Firm,“ identifying a set of principles Cardinal Health uses to allow lawyers to work on their own devices. These are guidelines every law firm, corporate legal department, and government office can use to devise a policy today…
read moreListen, we’ve got nothing against IT people. Some of our best friends are in IT. But let’s face it, your IT team can’t be on top of everything. So why do we expect them to keep mission critical systems up and running as well as figuring out why the printer keeps jamming? According to the…
read moreA critical, strategic mistake I see law firms and corporate law departments make on a regular basis is to reinvest in litigation technology that isn’t future proof. It’s not that firms aren’t spending on technology – it is just spent poorly. That’s a direct result of the propensity to continue to reinvest in legacy technology systems far…
read morePhysical and Environmental Controls As a further comparison to the typical on-premise solution you may be using to store confidential client data, here’s a closer look at physical and environmental controls of cloud data centers. The following precautions apply to nearly all large scale cloud vendors, but for this case we are specifically referring to…
read moreThis week we’re going to take a look at a series of cloud computing security provisions to keep data safe. There are a number of reasons why cloud computing environments (including Nextpoint) can be inherently more secure than any solution hosted on-premise. One of the most basic and important provisions is two-factor authentication. If vetting any…
read moreTest As interest in cloud computing and our products is increasing, I’m doing a lot of eduction to lawyers on the internet. A joke I keep using to put into context cloud computing is to say, “I think this Internet thing will be big”. To further make my point about why the internet is important…
read more