Tag: Security

Q2 2021 Headliners

Here are the biggest things from this past quarter that we don’t want you to miss. New User Levels for WFA Security Challenges: Post-pandemic, many organizations are managing semi- or all-virtual operations, with a lot of uncertainty regarding how to keep distributed data safe....

3 Overlooked Security Concerns with a Hybrid Workforce

When it comes to the security of a distributed workforce, we’re not only talking about employees working from home, we’re talking about employees working from anywhere. The distinction opens up new concerns over network security, maintaining compliance, and avoiding data exposure....

Q1 2021 Headliners

Here are the biggest things from this past quarter that we don’t want you to miss. In our Suite of Technology, check out the latest from H5MA: version 2.7.3 has introduced a Privilege Log Builder Module. The builder improves and optimizes the workflow by including a customizable and reusable...

A Buyer’s Guide to Security and Privacy Certifications

IT procurement teams now have difficulty asking the right questions to shine a light on policies that govern their sensitive data and, perhaps more importantly, verify the accuracy and ongoing adherence to those policies....

Cloud Security Certification ISO/IEC 27018:2019 Achieved

We're ISO/IEC 27018 certified! This cloud-security-specific standard aligns with and complements our other accredited security certifications. To top it off, we're now the only Relativity partner publicly recognized as having ISO 27001, 27017, and 27018. ...

Internal Risks

72% of departing CEOs take intellectual property (IP) with them. In order to prevent a data breach (with the source being your own organization), there must be a contingency plan in place....

How to Safely Take In Bad Data

What should you do if you have data that you’re afraid of? What is the best way to disinfect it? Build an Airlock. Here's how to do it, with no risk to your other data or networks....

Strategies for Breach Prevention

With so little control over files and client data being passed back and forth through email, how can law firms take control of their data to avoid a breach? Our COO, Sal Dababneh, sat with Richard Rodney & Brian Dykstra to discuss strategies for breach prevention....