Blogs

Be the first person to like this post.
Legal Industry Leaders: The 2025 CrowdStrike Global Threat Report has officially dropped, and you don’t want to miss it. This is not just another cybersecurity rundown—this is a comprehensive view of what’s happening right now (and what’s lurking around the corner). If you’ve been tracking voice phishing, cloud misconfigurations, identity attacks, or the rise of threat actors targeting even the “smaller” players in legal, then this report is your indispensable guide. Below, we’ve distilled some of the most critical findings and trends that could impact your firm or organization. Whether it’s a 442% surge in Vishing attacks or the new wave of generative AI ...
0 comments
Be the first person to like this post.
Remember the early days of MDM (Mobile Device Management)? While widely used, the early iterations were not popular. MDM adoption still suffers from the early experience. We’ve come a long way from those days. Recent developments from Microsoft make authentication and data management easier for both users and for IT admins. Integration with the Intune SDK and Microsoft Authentication Library (MSAL) If you are either an Azure Entra ID user, an Intune user, or both, an MSAL integration offers a simpler experience for users and IT alike. Fewer sign-ins for both frequent and occasional LINK users Integrating MSAL into an app allows the app to ...
0 comments
Be the first person to like this post.
In today’s digital age, law firms manage mountains of sensitive client data using technology. Keeping client information safe isn’t just your duty, it is essential to the success of your firm. As law firm breaches increase, client questions about legal tech security and privacy rise as well. To answer these questions confidently, legal professionals should understand how their firm protects client data. In this article, we’ll share an overview of why legal tech security is so important and questions to ask legal tech providers when considering a new solution. We’ll offer an educational overview of security certifications and data privacy regulations you will ...
0 comments
Be the first person to like this post.
Recently, I came across a LinkedIn post from a friend who was #Hiring for a cybersecurity role. It got me thinking - just how challenging is it to find and crucially, to retain, experienced cybersecurity staff? According to my friend, it is very challenging. Intrigued, I decided to take a dive into the numbers. 71% of organizations are currently unable to fill cybersecurity positions, leading to a concerning skills gap in the workforce. This issue has been highlighted by The World Economic Forum , which warns of the potential impact on infrastructure and society as a whole. Globally, there is an estimated 4 million person ...
0 comments
Be the first person to like this post.
ILTA is posting this Member Blog on behalf of Kenneth Jones who is attending LegalSEC Summit 2023 and currently onsite in Baltimore, Maryland, USA. LegalSEC Wednesday Morning Workshop Session ILTA Blog Post Improving Communications Skills Within the Cybersecurity Field To kick off the 2023 LegalSEC Summit , o pening remarks were provided by Joy Heath Rush (C hief Executive Officer, International Legal Technology Association ) , Summit Co-Chair Gary Berger and conference committee member Josh ua Smith, each briefly discussing their unique perspective on some of ...
0 comments
Be the first person to like this post.
The International Legal Technology Association’s 2022 survey is a broad treasure trove of data reported from 541 law firms. There are 11 major topics including Infrastructure, Document Management, Practice Management, and Business Continuity. My focus is on four of the twenty-seven questions surveyed in the Security section. Password Management Password managers are one of the most highly recommended solutions for security. They help with: using complex passwords, deterring repeat usage of passwords, and providing secure storage for passwords. There is a learning curve to using a password manager, but once I got up to speed, I ...
0 comments
Be the first person to like this post.
Just because the company you work for is not a Fortune 500 company does not mean your credentials were not stolen at some point. According to an article in Security Magazine, 21 million login credentials stolen from Fortune 500 companies were found on the Dark Web. Bleepingcomputer.com reported that only 4.9 million of the passwords were unique. Just imagine what the results are for millions of other companies. For example, most small companies do not have large IT staffs and large IT security budgets. Think about small companies that outsource their IT needs to local and online service providers. Consequently, many of their compromised credentials are sitting ...
0 comments