Shared Links (weekly) April 11, 2021

posted in: Weekly Links 0 |
Reading Time: 1 minute

Introverts are dreading a return to the noise, crowds and small talk of ‘normal’ life

Why Now Is the Best Time in 20 Years to Make a Job Move in E-Discovery

How to Manage Your Total Cost of Review: Keeping Collections on Target

 – It’s simple really, collect less data and everything costs less.

Why do phishing attacks work? Blame the humans, not the technology

Encryption Has Never Been More Essential—or Threatened

As The Talent Wars Ramp Up, How Poach-Proof Are Your Employees?

Mental health at work: How employers can help

Technology, processes and people can close the cyber talent gap

Hacked companies had backup plans. But they didn’t print them out before the attack.

– the files were encrypted as part of the attack. Oops.

An anti-networker on why he networks virtually

Why we need to be taking more breaks from work… Read More

Shared Links (weekly) March 14, 2021

posted in: Weekly Links 0 |
Reading Time: 1 minute

Top 10 Situations You Can Avoid with a Protocol

The Key Takeaway From Steven Guilbeault’s Facebook Use: Linking Should Not Require a Licence

Bliss is Using Technology Assisted Review without Court Permission

Why Legal Teams Must Make Data Retention a Priority

You’re Not Alone If You’re Only Staying In Your Job Because Of The Pandemic

– Interesting thought exercise for employers – how many of your team is only staying “for now”?

How men are finding mental health support with digital tools

The FBI Should Stop Attacking Encryption and Tell Congress About All the Encrypted Phones It’s Already Hacking Into

Report: Quality, not quantity, is the hallmark of the latest waves of phishing attacks

– They are getting better at this.

Work Depression: What It Is and How to Deal with It

Managers aren’t doing enough to support anxious employees—how to start… Read More

Shared Links (weekly) Nov 8, 2020

posted in: Weekly Links 0 |
Reading Time: 1 minute

Desktop Users! One Out of Five of You is Running on An Insecure, Unsupported Operating System

Convenience and Catastrophes of Self-Collection

eDiscovery Productions in Business Productivity Suites: Truly End-to-End?

How to talk about mental health at work during pandemic and election

How to Identify a Phishing Attempt and Thwart It

Use the Brave Browser for Privacy Concerns

Getting on the Same Page…of the Dictionary

After 15 Years, Has the eDiscovery EDRM Model Been Realized

Time to Treat Broadband Like the Essential Service It Is

The secret struggles of introverts in a remote workforce

Dear Leaders, Are You Really Taking Care Of Your Working Parents In The Pandemic?

Many Americans Plan To Move, Now That They Can Work From Anywhere… Read More

What I am Sharing (weekly) Sept. 20, 2020

posted in: Weekly Links 0 |
Reading Time: 1 minute

Five Strategies Building Relationships Remotely

Software Updates and Why They’re Important

Legal advice is often unaffordable. Here’s how more people can get help

This security awareness training email is actually a phishing scam

“A creative phishing campaign uses an email template that pretends to be a reminder to complete security awareness training from a well-known security company.”

No Internal Investigation Is Complete Without ESI

Observations from the Annual ILTA Conference:

Ransomware Increases by 715% in First Half of 2020

E-Discovery Platform RelativityOne Gets Its Next-Generation Interface, Aero UI

Internet Access Has Never Been More Important — and Unequal

What is mental health first aid? Why every workplace should offer it

5 TED Talks That Will Make You Better at Remote Work… Read More

Twitter Hackers Were Smart, But Hardly Genius

posted in: Tech 0 |
Reading Time: 2 minutes

Smart enough to get in, not smart enough to cover their tracks when getting paid. That doesn’t seem so smart. Which goes to show, that security around Twitter could have been a lot better, and people who work there maybe should have been a little less careless. That doesn’t bode well for the rest of us when even a big tech company can’t get this right. How many of us have people on staff who might fall for this kind of phone-based attack?

What should we think of the complicated, super-smart hackers who also manage to be so easily identifiable? Should we accept that the hardest thing about any conspiracy, and this goes for all the conspiracy theories out there, is making sure one person doesn’t do something stupid and give it all away? That. actually, is nearly impossible, and is the one thing that makes most theories unbelievable to me. This hack proves to be a perfect example.… Read More

1 2 3 4 7

Privacy Policy Settings

x

Follow me on social media

Facebook

Instagram

Linkedin

Twitter