Members recently discussed mobile device management solutions, controlling a reputation in Google results, computer history and more. Explore curated sources on these topics including some from ILTA’s treasure chest.
MOBILE DEVICE MANAGEMENT
A few members asked what mobile device management (MDM) solutions other organizations use. According to ILTA’s 2014 Technology Survey, about 46% of respondents do use an MDM solution, an increase from 39% of respondents in 2013. The LegalSEC Summit in June 2015 offered a session discussing MDMs, “Mobile Communications Security Threats.” In Rick Varju’s blog posting, “Law Firm Mobile Data Security: We All Have an Ownership Role in This,” he shares the importance of security not only with an MDM solution but also with encryption and especially user awareness.
REPUTATION BY GOOGLE RESULT
An attorney from an ILTA member firm did not like the leading results when searching his name in Google. Many in the discussion forum sympathized and suggested creating new content to push the less desirable results to the second or third result page in Google. Forbes has written articles on online reputation management in the last couple of years including “Six Steps to Managing Your Online Reputation” and “Top Online Reputation Management Tips for Brand Marketers.” For a more proactive approach, see the ILTA 2014 conference recording, “Social Media: Worth the Time and Effort.”
THE HISTORY OF COMPUTER TECHNOLOGY
A discussion thread last week began with a story of a 2008 college graduate not knowing of Wang computers. Many took a walk down memory lane and recalled the early days of technology in their careers. Did you know ILTA began as a small community of Wang Computer users in law firms? The first installations were occurring in the late 70s, and the first meeting of the group occurred in 1980 to discuss concerns with the accounting software product PSS. This product would be sold, acquired and relabeled many times in rapid succession, landing finally with Wang Informatics. Today the peers of ILTA continue to support each other to troubleshoot, develop best practices and share emerging technologies. If you have “Millennials” on your team, perhaps you can provide a glimpse at history with this timeline of computer technology from the Computer History Museum.
SOMETHING EXTRA - ILTACON 2015 Previews and the Android Security Flaw
ILTACON 2015 begins in a few short weeks. Leading up to the conference, I will highlight a few sessions that cover the Cloud, Mobility, Information Governance, Security, and Business and Process Improvement. I interviewed some of the speakers and the session developers for an inside look. Today I offer a preview of sessions related to Information Governance. I will also post a daily blog during ILTACON2015 for those unable to attend in which I will highlight sessions to help you determine which recordings to access later. All ILTA members can gain from ILTACON 2015.
Striking the Right Balance: Collaboration vs. Governance, Tuesday September 1, 1:30-2:30 p.m. Knowledge management professionals in mid-size to large firms will not want to miss this session discussing the new realities of security impacting knowledge management. The world of open KM and collaboration have shifted recently to one of secured documents with more restricted access. Panelists hail from three firms at different stages in the process of balancing the collaborative sharing world of knowledge management with the more restricted world of secured documents clients now demand. Bring your questions about clarifying the new KM realities, getting acceptance from management, sanitizing documents, and communicating your security best practices to clients.
Unstructured, Untagged and Untapped: Get Rid of the “Un” With New Ways to Find and Manage Enterprise Content, Tuesday, September 1, 3:30-4:30 p.m. Large amounts of unstructured data exist in your organization. In the past, not everything was matter-centric. These realities could now become a security risk. In this session for information governance, knowledge management, security and enterprise content management professionals, learn how to leverage technology you may already have to harness and define your unstructured data. E-discovery, data loss prevention and predictive coding tools can help you quickly find unstructured data and make informed decisions regarding this data. Clients now demand protection of their information for open matters and want to know what happens to the data once the matter closes. Attendees will learn about using existing and emerging technologies and obtaining buy-in through the leveraging of potential security risks.
Last week a member shared the NPR story of the Android Security Flaw called Stagefright. Though information on the security flaw was released back in June the response time by Google and wireless providers has trickled in more slowly. Here’s Re/code’s take on Stagefright, “Heartbleed for Mobile.” Two days later Trend Micro researchers uncovered a new security flaw for Android according to ZDNet, “New Flaw Can Render Most Android Phones Unresponsive and Useless.” If the security threats do not have you shying away, look at Lisa Needham’s post in the Lawyerist, “Every Legal App for Android.”
As ILTA’s content curator, I’m always monitoring the discussion forums to discover what topics are top-of-mind among the members. Each week, I focus on a few areas that spark your interest, and I provide some curated resources to assist your own information-gathering on the topics. If there are specific topics you would like assistance exploring, please contact me at joanne@iltanet.org.