Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 15
Sort by

Blog Entry
Open Source Cyber Tools for When You Are On a Tight Budget

Please enjoy this blog post authored by Dr. Georg Thomas, CCISO, CDPSE, CISM, CISSP, GRCP Cyber-attacks are on the rise across the globe with 2021 identified as the highest average cost of data breaches over the past 17 years (IBM, 2021). Law firms are under increased pressure from...


Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving: Part 4

In our 2021 Information Governance blog series regarding Microsoft Teams, we will take a look at the chat features and considerations around the retention and disposition of these messages. The information presented here is not intended to be considered legal advice nor instruction. The blog...

Chuck Barth's profile image

Blog Entry
Maintaining a Vulnerability Scan Remediation Report

Please enjoy this blog post that was co-authored and posted on behalf of Marc Ohmann - President, CEO - Digital Solutions, Inc and Jamison Masters, Co-Founder, Verus Corporation . A vulnerability is a weakness in a covered device that can be exploited by attackers to gain unauthorized...


Blog Entry
Building an IG Committee from the Ground Up

Please enjoy this blog post authored by Megan Larkins, Information Security Consultant Manager, FRSecure . Description: Managing an Information Governance (IG) committee can be difficult enough, but the process is elevated to another level if you’re tasked with assembling one from the...


Blog Entry
IG Considerations for M365 and Teams: Chat Retention and Archiving

As many organizations move to MS Teams in a constantly evolving M365 ecosystem, there are many IG concerns that need to be considered. You need to make sure the guardrails are in place before, and after, opening the doors. This entry in our blog series, specifically explores MS Teams chat...


Blog Entry
Pillars of a Solid Insider Threat Program

According to a report released in 2020 by the Poneman Institute, “the number of insider-caused cybersecurity incidents increased by a whopping 47% since 2018” . Insiders are trusted individuals that work for an entity and as a result are privy to systems and information that is not available to...


Blog Entry
Vendor Governance to Integrate Teams and Document Management Systems

Please enjoy this blog post authored by Reggie Pool, Senior Director, HBR Consulting LLC. This is the third article in the series on Teams governance, addressing the challenges and benefits of Teams and Document Management Systems (DMS), including managing safeguards, classification,...


Blog Entry
Who Moved the Folder? Transforming Shared Drive Clean Up

Please enjoy this blog post authored by Kathleen Jimenez, Information Governance Manager, White & Case LLP. Please Note: This blog is part of the Taming Unstructured Data series which includes the introduction and additional blog which you will find below in the related content. ...


Blog Entry
Taming Unstructured Data - Vortex of Chaos Project

Like many law firms, we had various network shares where users could place data. They had been around for a very long time, with no real oversight. Problems began cropping up with available space and many of these locations were not expandable. As these locations filled, IT started asking who...

Tamara Tureson's profile image

Blog Entry
A Deep Dive into Provisioning in Teams, With 3rd Parties, Powershells and When Should IG/Sec Be Involved

Please enjoy this blog post authored by Bryn Bowen, Principal, Greenheart Consulting Partners. Of all of the collaboration tools being used in the law firm world, Microsoft Teams is the most popular because it’s already available to end users as part of many firms’ Office 365 suite, and...