data security

ediscovery collection best practices: dangers of self-collection

Don’t Let Self-Collection Spiral Into Self-Destruction: The Potential Pitfalls and Risks When Clients Collect their Own Data

Don’t Let Self-Collection Spiral Into Self-Destruction: The Potential Pitfalls and Risks When Clients Collect their Own Data 1200 700 Elizabeth Guthrie

Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable encyclopedia of case law. You just sent your paralegal to collect an official notice from the judge in your latest…

read more
Legal software Canada and California expansion

Nextpoint Expands Secure Data Hosting to New Regions Across North America

Nextpoint Expands Secure Data Hosting to New Regions Across North America 1200 700 Elizabeth Guthrie

Nextpoint launches new developments for legal software in Canada and California amidst recent changes to data privacy and security laws. In May 2022, Nextpoint will begin hosting data on AWS servers in California and Canada, in addition to our current location on the East Coast. This will ensure our users can meet data privacy standards…

read more
Ransomware Attack Cybersecurity

A Message on Cybersecurity from CEO, Rakesh Madhava

A Message on Cybersecurity from CEO, Rakesh Madhava 1920 1280 Rakesh Madhava

To All Nextpoint Clients: After the news that Epiq Global had suffered a ransomware attack, it is appropriate that many will have data security at top of mind, and may be curious about Nextpoint security provisioning. Our sincere sympathies go out to our clients who have been affected as well as to the staff of…

read more
security for attorneys

5 Security Tips for Lawyers Working Online

5 Security Tips for Lawyers Working Online 1000 667 Michael Beumer

As long as attorney work requires access to the sensitive personal records of end clients, law firms will always be a top target for hackers. SaaS software typically offers greater security and less maintenance than locally installed products. But, users share some basic responsibility for keeping client data secure. As an attorney, this is part…

read more

4 Critical Law Firm Data Security Tips

4 Critical Law Firm Data Security Tips 150 150 Rakesh Madhava

Recently, I’ve been asking law firms to defend their decision to continue storing client and firm data on premise. The most common defense I hear from firms is that it’s risky to put it in the cloud, where it is “potentially at risk of being hacked.” Essentially, the pervasive belief in law firm data security is…

read more

Litigator’s Brief: 5 Lessons from the Anthem Security Breach

Litigator’s Brief: 5 Lessons from the Anthem Security Breach 150 150 Rakesh Madhava

In February, Anthem Blue Cross revealed it had been the victim of a cyberattack. The attackers breached a database that contained over 80 million records of past and current customers, and Anthem employees. Anthem is the largest for-profit health care insurer in the Blue Cross and Blue Shield Association, formerly known as Wellpoint. Anthem is comprised…

read more

Data Security: 6 Important Takeaways From The Sony Hack

Data Security: 6 Important Takeaways From The Sony Hack 150 150 Rakesh Madhava

The Sony Hack is big news and big news for lawyers. Besides the international political implications, celebrity backstabbing, studio politics and the involvement of a North Korean dictator, there are a number of legal angles already emerging with more to come. Of course, there’s lawsuits. Sony has brought in Boies Schiller & Flexner to assist…

read more

Data Security Ethical Obligations for Litigators : Four things to tell your clients

Data Security Ethical Obligations for Litigators : Four things to tell your clients 1920 1280 Rakesh Madhava

Like all professionals in 2014, every modern litigator uses technology to get their job done. As with all industries, technology is the wonder drug delivering efficiency to a lawyer’s practice and duty of competent representation. The fly in the ointment, however, is the issue of confidentiality regarding client data that has litigators rightly concerned about…

read more

Inside the FTC: Data Security Battles and Hunt for Identity Thieves

Inside the FTC: Data Security Battles and Hunt for Identity Thieves 150 150 nextpointguest

Nextpoint’s Expert Witness is a feature offering insights from lawyers, technologists, law enforcement, entrepreneurs, and other interesting people influencing our industry and world. Check back regularly for thought-provoking expert opinions.   EXPERT WITNESS: Steve Wernikoff Nextpoint recently spoke with Steve Wernikoff, attorney with the Federal Trade Commission in Chicago who specializes in consumer protection matters…

read more

Forget Defensible Deletion. Think Defensible Storage.

Forget Defensible Deletion. Think Defensible Storage. 150 150 Jason Krause

Defensible deletion is one of those topics lawyers have been hearing about a lot lately. Unfortunately, it’s also a subject that just means headaches for lawyers. Just this week, a poorly run deletion policy has had an enormous and possibly devastating affect on a major lawsuit. A Federal judge has hit Samsung with an adverse…

read more