|

Law Firms Blocking Webmail – Security Window Dressing

So, apparently we’re back on the “we must block access to personal email accounts” bandwagon at large law firms. At least they aren’t claiming it’s to keep people productive, that argument went out the window the day the first iPhone showed up at the office, and we no longer needed the company’s internet connection to…

What I’m Reading (weekly)

Tom O’Connor and Law Bulletin Publishing Company of Chicago Release 8th Annual eDiscovery Survey | Advanced Discovery tags: MM LitSupport Emailgate Highlights the Challenges of Shadow IT tags: MM Security LitSupport Man Who Deactivated Facebook Account To Dodge Discovery Request Smacked Around By Disgruntled Court tags: MM LitSupport How To Test Your Home Network Security…

What Happens When the Hackers Start Planting False Information Instead of Stealing Information?

What Happens When the Hackers Start Planting False Information Instead of Stealing Information?

That’s a good question, and the part the Bruce Schneier found most interesting about a recent report by the Director of National Intelligence. Obviously, their focus is on the danger of intelligence information being altered, and the leadership no longer being able to trust the information given to them, but as a regular citizen, I’m…

|

Complicated Situations for Tech Consultants

Bryce Whitty has a list of 7 situations you may find yourself in as a consultant, and asks how you would handle them. There’s some interesting discussion going on in the comments. I do have one comment, regarding number 7 “A male client wants you to setup monitoring software on his wife?s computer because he…