Role-Based
Access Control (RBAC) is a critical method of security when it comes to
controlling who has access to resources and what they can do with those
resources. With RBAC, several roles are defined for a resource that
dictate what actions that role can take on that resource. For ex ...
Microsoft has been
rolling out a new Microsoft Authenticator feature which has added another layer
of protection to your 2FA process. Users will now notice that Microsoft
Authenticator is requiring number matching during the authentication process.With the constant
evolution of cybersecurity threat ...
This October will mark the 20th annual
Cybersecurity Awareness Month. The Cybersecurity Infrastructure Security Agency
(CISA) and the National Cybersecurity Alliance (NCA) have partnered to declare
the October 2023 theme “It’s Easy to Stay Safe Online” and encourages “4 Simple
Steps Every A ...
Is AI
taking over the realm of law?New
websites, such as Spellbook, are in the works, claiming to be the ChatGPT for
lawyers. Spellbook uses GPT-4 to review and suggest language for legal
contract, right in Microsoft Word. Spellbook is trained on case databases, form
libraries, and statutes, which ...
Sage Software has announced the release of a new cloud-based time tracking and billing solution. “Timeslips Anywhere” is a new addition to the suite of time and billing solutions available from Sage. Timeslips Anywhere would be a great option for those firms who want to manage their time and ...
In
today's digital age, our computers have become a large part of our home, and
work lives. However, the more we use our computers, the more digital clutter we
accumulate. This can slow down our computers, make it harder to find files, and
even compromise our security. That's why it's important to ...
NetDocuments announced
the acquisition of Worldox this past
October 2022. Worldox had
been a leader in document management for many years, with a strong client base
within the legal market. With the acquisition by NetDocuments, Worldox
customers are now faced with deciding on a migration path ...
With
working from home and hybrid work models, the use of personal devices for work
purposes has become increasingly common. While this trend is very convenient
for both employers and employees, it also poses a significant risk to both. Let’s
dive into the risks of using personal devices for work ...
Your
phone vibrates, and you check the message: it appears to be from your bank,
urging you to take immediate action - but could this be a smishing attack in
disguise? As we increasingly rely on our smartphones for everyday communication
and transactions, smishing is just one of the many threats to ...
On Wednesday, January 25th Alicia will be doing a CLE webinar for the ACBA. She will be speaking on, "What You Need to Know to Be More Proactive About Cyber Security". Alicia’s seminar will review what you need to know to be more cyber secure and technology competent to help prevent a cybercrimin ...