Apr
29

Don’t be next! Minecraft Third-Party Suffers Security Breach

By now, you have heard of the security breach suffered by a Minecraft third party called Lifeboat which caused roughly 7 million user passwords to be penetrated or hacked.  The even more unfortunate part? It happened months before Lifeboat admitted … Read More

Apr
12

How IT can meet the demands of eDiscovery & Policy Enforcement

A company’s email system is arguably the center of their corporate communications. Not only is it the centerpiece in the actual message content, but also as a mechanism for sharing files and documents that can be transmitted and retransmitted across … Read More

Mar
29

WHITE PAPER: An Introduction to PCI and PII: Securing Your Organization’s Data

Just about every day, the national headlines include stories about data breaches that have compromised the security of thousands or even millions of confidential electronic records, often containing credit card or social security numbers. Usually, this occurs at organizations found … Read More

Mar
16

Bridging the chasm between IT and Legal – (Part 2 of 2)

IT and Legal must work hand-in-hand in order to allow your organization to be profitable and successful. By developing a thorough plan and properly implementing the right tools, you can create a cohesive team. In Part 1 of this series, … Read More

Mar
08

Why bring eDiscovery in-house?

Traditional models of eDiscovery have involved collecting electronic files from email servers, file shares and other data repositories, then handing if off wholesale to outside vendors for culling, processing and review. With the advent of effective in-house software and solutions, … Read More

Feb
16

Bridging the chasm between IT and Legal (Part 1 of 2)

In today’s litigious world of business, one of the most important relationships is between IT and Legal. These two departments must be in sync for any eDiscovery and/or policy management process to be successful. Both are necessary players and the … Read More