Flexibility and transparency: The keys to good remote leadership
Three Key Tips to Keep in Mind When Leveraging Corporate G Suite for eDiscovery
Five Strategies for Building Relationships Remotely
Mothers Are Paying the Price at Work for Coronavirus
-“Preventing a mass exodus of mothers from the workforce must be a priority.”
What Does Private Browsing Do? Less Than You Probably Think
Face masks are breaking facial recognition algorithms, says new government study
– Aww that’s a shame. Not.
The Biggest Lesson from the Twitter Breach
– “Focus on the vulnerability of humans”
The Sedona Conference Commentary on Law Firm Data Security Released
The End of Life Hacking
– If you were around in the early days of blogging, this may make you laugh, or cringe. Maybe both.
Microsoft told employees to work from home. One consequence was brutal
– The lesson, management and employees need to create boundaries around when you’re working, and when you’re NOT.
WORK from home or don’t work at all: telecommuting in the age of COVID-19
Business as Unusual? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2020
We’ve seen the memes. The ones about the law firm offering a lunch hour yoga class to overworked, stressed, associates who haven’t had time to even take a lunch break in months. Or the “reward” for months of 70-80 hour work weeks is free pizza. It just makes people angry because it’s a token that does nothing to actually recognize the work involved, or correct the problems that created this mess to start with.
Workplace stress, anxiety, and other mental health issues are not just something a little mindfulness can fix. Workers are waking up to the fact that it’s the company culture that is contributing to this. Offering a way for employees to help “fix” themselves might seem like a nice thing, and in many ways it is, but doing it while not making any effort to recognize the contributions managers and corporate culture make to the problem, along with a commitment to make changes, is the very definition of “too little”.
Lawyers and technology competency: Louisiana weighs in Behind The Scenes Look At How Facebook Dealt With Christchurch Shooting Demonstrates The Impossible Task Of Content Moderation Text Messages Must be Preserved Structured Data and E-Discovery: When Is It Time to Call in the Experts? Mueller Report: Backdoor Encryption Debate is Still Alive and Well Mueller? Mueller?…
In this case, it wasn’t even that Nest had an insecure device, though that is often open to debate with Internet of Things devices. No, this was all about reusing passwords. “The method used to spy on the Thomases is one of the oldest tricks on the Internet. Hackers essentially look for email addresses and…
If you travel around, and I know plenty of you do, it would behoove you to follow the advice in the article below. When you’re device is set to auto-connect to even just known networks, you may find yourself connecting to a Starbucks network, or hotel network that isn’t actually that network, but rather someone…