Shared Links (weekly) Feb 1, 2026
For more like this, subscribe to the newsletter and get these links and more in your email.
Follow these topics: Weekly Links
For more like this, subscribe to the newsletter and get these links and more in your email.
Follow these topics: Weekly Links
Monday, Monday. Actually today hasn’t been too bad, the new and improved security policy was rolled out this morning to staff, so today’s been busy answering questions, explaining to people what they need to get rid of, and why. We’re really working to root out unlicensed software, and spyware that’s gotten into some of our…
1. Users are the weak link in the chain Lack of training/awareness about phishing and ransomware is the number one reason these attacks are so successful. According to the research, 6% of users have never received security awareness training, crushing confidence in staff’s ability to recognise threats and act dutifully. Users should be trained…
The First Step of Preparedness is Awareness tags: MM Tech The RETE’s Question: Do You Have An Answer? tags: MM Tech Go Ahead – Make My Day – Erase That Drive 35 Times tags: MM Tech Security Posted from Diigo. The rest of my favorite links are here. Follow these topics: Uncategorized
Yeah so this is maybe something to keep in mind: Last year security researchers told TechCrunch that malicious users could access and listen in to Zoom and Webex video meetings by cycling through different permutations of meeting IDs in bulk. The researchers said the flaw worked because many meetings were not protected by a passcode. Lawyers,…
I thought this quote from a ComputerWorld article really sums up what I’ve been thinking since I moved into Litigation Support and out of a strictly IT job. ?[FRCP] has made their lives incredibly complicated,? Nirken said. IT is now responsible for immediately locating electronic files that ?can exist just about anywhere ? in networks,…
Refuting the Magic Button of eDiscovery tags: LitSupport MM The Rise of Strategic Partners and Better Corporate eDiscovery Practices tags: LitSupport MM A Guide to Forms of Production tags: LitSupport MM Lessons From Drafting Overly Broad Requests tags: LitSupport MM The Importance of Cybersecurity in eDiscovery tags: LitSupport MM Jeremy Palmer — Google is Breaking the…