WindTalker Blog

Legal’s Apprehension of the Cloud Computing Has Solutions

Posted by WindTalker, Inc.

In her 6/26/19 article for Legal Tech News, “Can Cloud Providers Calm Legal’s Apprehensions,” Victoria Hudgins, observes: “As cloud computing becomes more popular, some law firms and corporate legal departments aren’t jumping fully on the bandwagon.”

Read More

Topics: LegalTechnology, databreach, sensitive data, Differential Sharing, Data Security, cloud computing, unstructured data

We Cannot Afford to Wait for Someone Else to Solve our Security Issues

Posted by WindTalker, Inc.

Today, security is top of mind for many in the legal profession. The EU’s GDPR, now one-year-old, certainly grabbed our attention and California’s similar CPPA, set to take effect early next year, has increased awareness. While the news has extensively covered major data breaches, it is easy for lawyers, law firms, in-house counsel, and their staffs to dismiss exposure to those occurrences because we typically do not collect large volumes of data in our day-to-day practices.

Read More

Topics: LegalTech, sensitive information, Court Documents, GDPR, Cyber Security, Legal Technology, Data Security, Ethics

Cost of Data Breaches Soon to Reach the Trillions

Posted by WindTalker, Inc.

In his 3/8/17 article, “Rising cost of data breaches to $2.1 trillion by 2019…” Luke Irwin of IT Governance ominously wrote: “[W]e found an astounding figure of 3.1 billion records leaked in 2016, conservatively. We also discovered an infiltration of law firms’ email worth $4 million stolen [and] data breaches anticipated to be at 2.1 trillion by 2019, in less than 2 years from now.”

Read More

Topics: LegalTech, compliance, databreach, Unstructureddata, Cyber Security, Legal Technology, Data Security, Luke Irwin, Global Breach Level Index

The WindTalker Blog

A Perspective on Cybersecurity Developments

Join us as we explore newsworthy developments in Cybersecurity. The WindTalker Blog is dedicated to sharing and informing the latest developments and providing a resource for subscribers in your journey to become more informed and protect your sensitive information.


Covering:
• Differential Sharing
• Avoiding Data Breaches
• Information Security

Subscribe Here!

Recent Posts