21 Apr 2016

Is “Security by Obscurity” an Obsolete Concept?

Screenshot (192)
Share:

The term “security by obscurity” has been around for a long time. Traditionally, this has referred to the idea that the best way to keep a system safe is to keep its design (and any potential vulnerabilities) a secret. To many, “security by obscurity” has also represented the idea that there is safety in numbers, such as on a social media network that has hundreds of millions of users. One might argue that the intersection of social media,... Read more...

Screenshot (192)
Share:
14 Apr 2016

Business Email Compromise (BEC) – Industry Examples

Author:
Share:

Imposter emails targeting businesses today are far more sophisticated than traditional phishing emails or the “Nigerian prince” emails of yesteryear. These new Business Email Compromise (BEC) attacks use imposter emails that reflect a deep understanding of people’s roles and messaging patterns within a target organization. Here’s how BEC attacks often play out for several reference industries: Law Firms and their Clients An... Read more...

Share:
07 Apr 2016

Does the New Era of Mega-Leaks Obsolete Attorney-Client Privilege?

disputeresolution_attorneyclientprivilege_160x160
Share:

On Sunday, more than a hundred media outlets around the world, coordinated by the Washington, DC-based International Consortium of Investigative Journalists (“ICIJ”), released stories on the “Panama Papers”, which is an exposé of private client and internal work product emails and other files.  More than 5 million emails and files were stolen from within the IT systems of the exclusive Panamanian law firm Mossack Fonseca.... Read more...

disputeresolution_attorneyclientprivilege_160x160
Share:
24 Mar 2016

Understanding Common Misconceptions about Email Delivery (Part 3)

Screenshot (192)
Share:

In the final part of our three part series on common misconceptions about email delivery, we’ll discuss a type of system that many attorneys use and believe can prove fact of e-delivery. Some attorneys send (or advise clients to send) disclosure documents using a link-retrieval system. The recipient receives a link to download the document. A record of the delivery of the disclosure document generally would protect the sender in certain future disputes... Read more...

Screenshot (192)
Share:
15 Mar 2016

Understanding Common Misconceptions about Email Delivery (Part 2)

Screenshot (192)
Share:

Most disputes center on who said what to whom and when. When an email gets lost without the sender being aware, the entire conversation or negotiation can derail, and there can be serious financial and/or reputational damage as a consequence. Have you ever been in a situation where an email vanishes? Part 2 of “Common Misconceptions about Email Delivery” prepares you in case delivery of your (or a client’s) time-dependent email is disputed.... Read more...

Screenshot (192)
Share: