Shared Links (weekly) Nov 8, 2020

posted in: Weekly Links 0 |
Reading Time: 1 minute

Desktop Users! One Out of Five of You is Running on An Insecure, Unsupported Operating System

Convenience and Catastrophes of Self-Collection

eDiscovery Productions in Business Productivity Suites: Truly End-to-End?

How to talk about mental health at work during pandemic and election

How to Identify a Phishing Attempt and Thwart It

Use the Brave Browser for Privacy Concerns

Getting on the Same Page…of the Dictionary

After 15 Years, Has the eDiscovery EDRM Model Been Realized

Time to Treat Broadband Like the Essential Service It Is

The secret struggles of introverts in a remote workforce

Dear Leaders, Are You Really Taking Care Of Your Working Parents In The Pandemic?

Many Americans Plan To Move, Now That They Can Work From Anywhere… Read More

What I am Sharing (weekly) Sept. 20, 2020

posted in: Weekly Links 0 |
Reading Time: 1 minute

Five Strategies Building Relationships Remotely

Software Updates and Why They’re Important

Legal advice is often unaffordable. Here’s how more people can get help

This security awareness training email is actually a phishing scam

“A creative phishing campaign uses an email template that pretends to be a reminder to complete security awareness training from a well-known security company.”

No Internal Investigation Is Complete Without ESI

Observations from the Annual ILTA Conference:

Ransomware Increases by 715% in First Half of 2020

E-Discovery Platform RelativityOne Gets Its Next-Generation Interface, Aero UI

Internet Access Has Never Been More Important — and Unequal

What is mental health first aid? Why every workplace should offer it

5 TED Talks That Will Make You Better at Remote Work… Read More

Twitter Hackers Were Smart, But Hardly Genius

posted in: Tech 0 |
Reading Time: 2 minutes

Smart enough to get in, not smart enough to cover their tracks when getting paid. That doesn’t seem so smart. Which goes to show, that security around Twitter could have been a lot better, and people who work there maybe should have been a little less careless. That doesn’t bode well for the rest of us when even a big tech company can’t get this right. How many of us have people on staff who might fall for this kind of phone-based attack?

What should we think of the complicated, super-smart hackers who also manage to be so easily identifiable? Should we accept that the hardest thing about any conspiracy, and this goes for all the conspiracy theories out there, is making sure one person doesn’t do something stupid and give it all away? That. actually, is nearly impossible, and is the one thing that makes most theories unbelievable to me. This hack proves to be a perfect example.… Read More

1 2 3 4 7

Privacy Policy Settings

x

Follow me on social media

Facebook

Instagram

Linkedin

Twitter