Security

Strategies for Breach Prevention

With so little control over files and client data being passed back and forth through email, how can law firms take control of their data to avoid a breach? Our COO, Sal Dababneh, sat with Richard Rodney & Brian Dykstra to discuss strategies for breach prevention....

How to Provide Maximum Security for Remote Users

This year has, thus far, tested the bricks in the foundation of many organizations in our industry. Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users. ...

Legal Service Providers During Quarantine: Who’s Exposed?

This is a challenging time for legal service providers. Not only do we need to comply with new workplace standards brought on by COVID-19, but we’re also in the wake of the most significant security breach in our industry’s history....

Breach Prevention

As part of our eDiscovery Unredacted video series, COO Sal Dababneh met with Brian Dykstra, CEO of Atlantic Data Forensics and Richard Rodney, President of iFi, LLC, to discuss frequently and surprisingly overlooked steps in breach prevention....

Gone Phishing

I’m not here to tell you all the gory details, the hundreds of different “phishing techniques,” or tell you how to fix everything. However, it is my opportunity to get your attention and ensure you know that you can win this fight yourself. Yes, your IT or Information Security...

ISO 27017 Certification

Oasis helps clients and partners meet their compliance requirements across a broad range of regulated industries and markets. This certification is more good news for our clients and partners, providing additional transparency and independent assurance that we follow this internationally recognized cloud security code of practice....

New Information Security Manager

Matt has a long history of leadership in Security and Privacy. He joins us after five years of serving as an information security consultant implementing ISO standards for companies, performing social engineering tests, providing security training, and strengthening risk management. ...