14 Oct

Avoiding DIY Disasters

This past weekend, I was sitting in my backyard and looking at the leaves start to turn to their autumn hues, and I heard a noise from a few houses down.  One of our neighbors behind us is having a large expansion done to their home.  The workers there were starting to put windows into the new

13 Oct

The Smartphone Lifecycle: Keep Data Confidential During and After Device Use

Smartphones and tablets have become critical tools for delivering efficient and effective client service. Mobile devices enable attorneys to manage their cases and review information wherever they are, whenever they need to. The power and sophistication of mobile technology allows attorneys to work from anywhere as if they were sitting at their desks. However, this

06 Oct

BadUSB – A New Threat to USB Devices

This summer at the BlackHat 2014 security conference, researchers demonstrated an exploit that can be used against USB devices called “BadUSB.” When this was first presented, the individuals who developed and demonstrated the exploit did not release the underlying code. However, at the Derbycon 2014 security conference this past week, two other researchers reverse engineered the

03 Oct

Shocking News: What You Need to Know About Shellshock

You may have already heard about the “Shellshock” vulnerability (CVE 2014-6271 and CVE-2014-7169) that has been in the news lately. If you haven’t, it’s a security vulnerability that was recently discovered that allows attackers to control remote systems that are using Bash 4.3 or lower on Unix, Linux, and Mac OS X. This vulnerability primarily impacts Unix

10 Sep

Q & A With Kraft Kennedy CTO Marcus Bluestein

Cyber security seems to be the topic du jour in technology, the way the “Cloud” was several years ago. But what exactly does the term refer to, and why should we be concerned with it? As Kraft Kennedy was preparing to launch its new Information Security and Governance practice group, Kraft Kennedy CTO Marcus Bluestein shared his thoughts on this important

02 Sep

Kraft Kennedy’s New Open Floor Plan Is a Viable Option for Some Law Firms

At the start of the year, Kraft Kennedy moved to a new office space and adopted an open floor plan and flexible seating arrangements. This is a model that more law firms will find viable as they look to lower overhead costs and promote collaboration among mobile attorneys across global offices. Since the recession of

22 Aug

What Does Microsoft’s Matter Center for Office 365 Really Mean for Legal?

At the 2014 International Legal Technology Association (ILTA) conference, Microsoft made what could be a major splash for the legal vertical.  Adding to their push for Office 365, Microsoft announced Matter Center. Although it is being marketed as “for Office 365,” Microsoft says it could also work in either hybrid or on-premises SharePoint environments.  That said, the

11 Aug

Which Meetings Are Worth Having?

A common misconception about project managers is that they just schedule meetings and produce lots of paperwork—meeting minutes, status reports, change requests, etc.  What good project managers really do is facilitate communication of the correct information to the correct people.  Good project managers work with their teams to determine the right meetings to schedule and the

21 Jul

Learn How to Develop and Implement an Information Security Program

Kraft Kennedy will discuss and review the essential steps that law firms need to take when planning and deploying an information security program. You’ll learn the key areas to focus on, such as training, best practices and response plans while addressing compliance (HIPPA/HITECH) and regulatory concerns (the SEC OCIE Cyber Security Initiative). Register today to

  1. 1
  2. 2
  3. 3
  4. ...
  5. 36