
Similar Posts

Linked: How to build a culture of cybersecurity
This is the one thing I’ve talked about before when it comes to where we might fall short on our cybersecurity training, we don’t really hold anyone accountable.
Make cybersecurity part of formal employee evaluation. Give people a reason to care. Much like I talked a couple of weeks ago about creating a training culture, provide a way for people to learn more and to learn from others. Give them space and time to talk about security. Recommend they read some security blogs, meet to share stories about the latest phishing information out there, etc.
Linked – This $5 device can hack password-protected computers in just 30 seconds
Kamkar’s new exploit, PoisonTap, uses free software and a $5 Raspberry Pi Zero microcomputer. After attaching the Raspberry Pi to a USB adapter and plugging it in, the device goes to work. In all of 30 seconds, it bypasses your lock screen and begins installing a backdoor that works even after the device is removed from…

Just Check Your Credit Card Transactions All of the Time
Image by frankieleon With the news this week that the Hyatt breach may have included up to 250 hotels, I think it’s time to just admit that your credit card info is probably out there somewhere. If it wasn’t grabbed from this hotel chain, at another, or at an online store, or through some other…

Linked – This Australian AI Aims to Be a ‘Law Firm Without Lawyers’
This is an obvious use of AI in law, allowing clients the ability to respond to questions and get legal documents like a will without the much higher expense of a lawyer’s time. This, is the part that jumped out at me though: “Much of the work these bots, and AI technology in general, do…
This Week’s Links (weekly)
Top Ten Internet Hoaxes of 2014 And the year is only half way over… tags:MM SocNetPres Review : eDiscovery Assistant for iPad tags:MM LitSupport Proportionality Prevents Mirror Imaging of Family Computers tags:MM LitSupport TrueCrypt Is Dead: 4 Disk Encryption Alternatives For Windows tags:Tech Security MM 9 Steps to a More Defensible Email Collection Protoco tags:MM…
Links (weekly)
Expediting E-Discovery Before Meet & Confer Conferences tags: LitSupport MM What the Market Really Wants From E-Discovery Software tags: LitSupport MM eDiscovery Careers: Achieving Success as a Non-Attorney in a Law Firm: Make Yourself Critical tags: LitSupport MM Staying ‘Above the Fray’ in Litigation tags: LitSupport MM The No Fly Zone of Producing An Entire…