Marquez: Expanding your perimeter for your firm’s cybersecurity
The lines are being blurred where the perimeter of the law firm’s technology responsibilities end.
The lines are being blurred where the perimeter of the law firm’s technology responsibilities end.
We have all heard about it. Many of us have seen its disastrous results or been affected by it personally. There are many security tools dedicated to combatting it. But do you know how a ransomware attack really works?
With every decision come factors we must prioritize to better guide us in making choices that align with what we value most. In terms of technology investments, these factors often boil down to security, convenience and cost.
What’s the difference between spoofing and impersonation? These terms are often used interchangeably, but they really are not quite the same.
Well before the current pandemic, BYOD policies were already in place for many law firms. BYOD stands for “bring your own device,” which in general terms allows users to access corporate data on their own personal devices.