join now
newsletters
topics
topics
advertise with us ABA Journal Blawg 100 Award 2009 ABA Journal Blawg 100 Award 2008
Subscribe (RSS Feed)TechnoLawyer Feed

Six Steps to Secure Your Firm's Data From the Threat Within Plus Sugar Daddy Clients

By Kathryn Hughes | Tuesday, September 24, 2013

Coming today to BigLaw: Advanced security technologies such as packet-inspecting firewalls, two-factor authentication, etc. only work if your users understand security threats. With social engineering a common method of attack, one lapse by one of your lawyers or staff can render your expensive security technology useless. In this issue of BigLaw, legal technology guru and law firm CIO Matthew Berg provides a six-step plan to minimize the threat from within — namely, the hundreds or thousands of people who work at your law firm. Also, don't miss the BigLaw Pick of the Week for an analysis of the "sugar daddy" clients on which large law firms depend.

How to Receive BigLaw
Large and midsize law firms have achieved unprecedented success yet they still have tremendous growth potential. Written by insiders, corporate counsel, and other industry experts, BigLaw unearths best practices in leadership, marketing, strategy, and technology, and features detailed product reviews with accompanying TechnoScore ratings. BigLaw also ensures that you won't miss anything published elsewhere by linking to insightful articles (and podcasts and videos) about large and midsize law firms, as well as notable press releases issued by the world's largest law firms. The BigLaw newsletter is free so don't miss the next issue. Please subscribe now.

Topics: BiglawWorld | Coming Attractions | Technology Industry/Legal Profession
 
home my technolawyer search archives place classified blog login