data control

encryption in transit at rest

This is one piece in our series covering our ediscovery chapter of a legal informatics textbook. In this series, we’re covering the ediscovery basics, including the history of the EDRM, core technical ediscovery concepts like cloud computing, the technologies powering ediscovery, as well as the future of ediscovery. Today we’re diving into a modern technology
Read More

cloud ediscovery

This is the fourth in our multi-part series covering our ediscovery chapter of a legal informatics textbook. In this series, we’re covering the ediscovery basics, including the history of the EDRM, core technical ediscovery concepts, the technologies powering ediscovery, and the future of ediscovery. Today we’ll start a deep dive into some of the technologies
Read More

Demystifying 2FA and Its Importance

Fortune Magazine reported recently that over 55% of computer users aren’t familiar with two-factor authentication (also known as 2FA or MFA, multi-factor authentication). In a survey of more than 450 educated computer users across the country, Duo Security found that “most people don’t understand the importance of 2FA in helping prevent unauthorized access.” These findings
Read More

Posted by on
What Does "Reasonable" Data Security Mean?

The November/December 2017 issue of ethikos, the Journal of Practical Business Ethics, featured an article by Everlaw’s Director of Security and Compliance, Lisa Hawke. Ethikos is published by the Society of Corporate Compliance and Ethics, a non-profit association made up of over 6000 compliance and ethics professionals, and examines ethical issues in business. In her article “What does ‘reasonable’ data
Read More

#NCSAM Week 5: Protecting our Infrastructure with Pen Testing

Week 5: October 30-31 Theme: Protecting Critical Infrastructure The theme for the final week of National Cyber Security Awareness Month is protecting critical infrastructure from cyber security threats. This week’s theme raises awareness about the importance of building resilience in your organization’s critical systems. Everlaw undergoes regular penetration testing (“pen testing”) by an independent third
Read More

Ediscovery security

Week 3: October 16-20 Theme: Today’s Predictions for Tomorrow’s Internet Connected devices, digitized records, smart cars, and smart homes have become a new reality. Week 3 reminds citizens that their sensitive, personal information is the fuel that makes these smart devices work. While there are tremendous benefits to using this cutting-edge technology, it’s critical to
Read More

Cyber security ediscovery

National Cyber Security Awareness Month (NCSAM) October is National Cyber Security Awareness Month! This is an annual campaign, led by the Department of Homeland Security, to raise awareness about the importance of cybersecurity. NCSAM is designed to engage and educate both public and private sector partners through events and initiatives. The goal of these initiatives
Read More