Top Menu

Are you as ready for the hackers as they are for you?

Ready or not, as the hacking community continues to evolve law firms have become a definitive target.

Are you as ready for the hackers as they are for you? Are you as ready for the hackers as they are for you?

Telepresence: The Promise (and the Overpromise)

Is telepresense all it's made up to be?

Telepresence: The Promise  (and the Overpromise) Telepresence: The Promise  (and the Overpromise)

Does Teleconferencing Really Improve Productivity?

Is teleconferencing effective?

Does Teleconferencing Really Improve Productivity? Does Teleconferencing Really Improve Productivity?

How to Block Ransomware

How Ransomware Finds a Foothold If your laptop and its contents were suddenly held for ransom tomorrow,… [more]

How to Block Ransomware How to Block Ransomware

Characteristics of a Good Information Security Plan

Three Components of a Successful Information Security Plan You Shouldn't Count Out Do you have your… [more]

Characteristics of a Good Information Security Plan Characteristics of a Good Information Security Plan

Recent Articles

Are you as ready for the hackers as they are for you?

Are you as ready for the hackers as they are for you?

Ready or not, as the hacking community continues to evolve law firms have become a definitive target. The legal industry has typically struggled to stay in front of the technology curve and many still do not have[...]
Telepresence: The Promise  (and the Overpromise)

Telepresence: The Promise (and the Overpromise)

Finally somebody called it: we'll be using more robots to communicate over long distances in the future, not less. According to technology intelligence research firm Tractica,  we'll be seeing a 50 percent increase in the use[...]
Does Teleconferencing Really Improve Productivity?

Does Teleconferencing Really Improve Productivity?

Teleconferencing and Productivity: Enemies or Allies? Does teleconferencing really improve productivity? From a macro point of view, the advantages of remote meetings have led to increasing adoption by the business sector at large: conference call specialist[...]
How to Block Ransomware

How to Block Ransomware

How Ransomware Finds a Foothold If your laptop and its contents were suddenly held for ransom tomorrow, how much would you be willing to pay for it? Hackers can easily put you in a position where[...]
Characteristics of a Good Information Security Plan

Characteristics of a Good Information Security Plan

Three Components of a Successful Information Security Plan You Shouldn't Count Out Do you have your security priorities all wrong? A 2014 study by Dell reports that over 75% of respondent organizations admitted to security breaches[...]