What I’m Sharing (weekly) Aug 2, 2020

posted in: Links, Weekly Links 0 |
Reading Time: 1 minute

Flexibility and transparency: The keys to good remote leadership

Three Key Tips to Keep in Mind When Leveraging Corporate G Suite for eDiscovery

Five Strategies for Building Relationships Remotely

Mothers Are Paying the Price at Work for Coronavirus
-“Preventing a mass exodus of mothers from the workforce must be a priority.”

What Does Private Browsing Do? Less Than You Probably Think

Face masks are breaking facial recognition algorithms, says new government study
– Aww that’s a shame. Not.

The Biggest Lesson from the Twitter Breach
– “Focus on the vulnerability of humans”

The Sedona Conference Commentary on Law Firm Data Security Released

The End of Life Hacking
– If you were around in the early days of blogging, this may make you laugh, or cringe. Maybe both.

Microsoft told employees to work from home. One consequence was brutal

– The lesson, management and employees need to create boundaries around when you’re working, and when you’re NOT.

WORK from home or don’t work at all: telecommuting in the age of COVID-19

Business as Unusual? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2020… Read More

What I’m Sharing (weekly) June 21, 2020

posted in: Links 0 |
Reading Time: 1 minute

The New Normal:Better Than Normal

 -For years, we have been told that administrative staff, especially legal assistants, cannot work from home. Apparently, that is not true.

INSIGHT: Redesign the Legal System for More Than Just Lawyers

It’s About Time!

– Clues to time are clues to truth

Why We Need to Think for Ourselves

7 Questions you need to ask before buying an eDiscovery solution

What Will Happen to Your Digital Life When You Die? Will it Go to Hell?

Are Passwords Obsolete?

New 39 Worrying Cyber Crime Statistics [Updated for 2020]

Reflections on Online Events and Virtual Handshakes

It’s Time to Put Self-Care Before Productivity

What steps should businesses take for ransomware protection? 44 security experts weigh in.

The Text Message Deduplication Dilemma – Part 1:Let’s play “Fill in the Text Message Gaps”… Read More

1 2 3 4 5 6 81

Privacy Policy Settings

x

Follow me on social media

Facebook

Instagram

Linkedin

Twitter