Zix Blog

Protecting the Legal Industry from Hackers

Wed, 05/18/2016 - 11:38 by ZixCorp
With the recent rash of alleged hacking attacks against legal firms, it’s become clear that no business type is immune from cyber-attack. As both hacking tools and “hackers-for-hire” multiply and prosper, not only have incidents of alleged hackings increased dramatically, but also the intellectual complexity of the frauds and the prowess of the perpetrators. That is, the hackers are smart and they collect a great deal of information about their victims in order to increase the chances of their success. The risks of data being intercepted in transit across the Internet is...
Read More

Hacking of Legal Firms Reinforces Obligation and Need to Protect Sensitive Client Data

Tue, 03/29/2016 - 23:30 by ZixCorp
Data breaches are a common headline. So much so that we may begin to glance over them, until an incident relevant to our personal lives wakes us up. Law firms are experiencing just that with breaking news about hackers who targeted Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP, which represent Wall Street banks and Fortune 500 companies. From managing lawsuits to negotiating mergers and acquisitions, Cravath and Weil collect, store and exchange massive amounts of sensitive information that is valuable to both criminals and competition. The same is true of any law firm...
Read More

Supreme Court Exposes Limitations of MDM Solutions

Mon, 07/07/2014 - 10:36 by ZixCorp
We’ve long alluded to the fact that mobile device management (MDM) has its limitations for both businesses and their employees. But hey, don’t take it from us….hear what the Supreme Court had to say in its recent ruling against cellphone searches without a warrant. In the opinion statements, Chief Justice John G. Roberts rejected the argument that evidence won’t be able to be preserved by the police due to phone wiping or encryption: Remote wiping can be fully prevented by disconnecting a phone from the network. There are at least two simple ways to do this . . . He then goes on to describe...
Read More

The Supreme Court’s Mobile Privacy Endorsement…and what it may mean for BYOD

Mon, 06/30/2014 - 10:45 by ZixCorp
This week was a landslide win for supporters of mobile privacy. On Wednesday, the Supreme Court protected mobile privacy rights by ruling 9-0 against cellphone searches without a warrant. While this will impact the 12 million people arrested every year, it’s really just the tip of the iceberg when it comes to defining what’s reasonable in terms of mobile privacy in the digital age. Chief Justice John G. Roberts Jr. set the stage for how cellphones play a role in our everyday lives. Roberts, writing on behalf of the court, stated that cellphones are “such a pervasive and insistent part of...
Read More

Follow-up Questions from Our Q&A: Enhanced Data Security Measures in the Legal Community

Tue, 04/15/2014 - 23:11 by ZixCorp
We recently posted a legal Q&A after two New York Times articles sparked an interesting discussion about data security measures at law firms. Zix General Counsel Jim Brashear often contributes and speaks on the significant need for data protection in the legal community, and he served as our Q&A expert. During the discussion, Jim provided responses regarding the hurdles law firms face in implementing additional data security measures, how those hurdles could be avoided and who determines when a law firm’s data security measures are adequate. After the post, he received some...
Read More

Enhanced Data Security Measures in the Legal Community: Q&A with Zix Expert Jim Brashear

Mon, 03/31/2014 - 17:20 by ZixCorp
Two recent New York Times articles sparked an interesting discussion in the legal community about data security measures at law firms. One article, Spying By N.S.A. Ally Entangled U.S. Law Firm , describes how government surveillance is capturing attorney-client email communications. The other article in Dealbook, Law Firms Are Pressed On Security for Data , describes how clients are demanding their lawyers step up their data security measures. Attorney data security is a topic near and dear to the heart of our General Counsel Jim Brashear. Jim has invested many hours writing articles,...
Read More

Emergence of a New Security Trend

Thu, 03/27/2014 - 19:24 by ZixCorp
Healthcare, financial services and government organizations make up the majority of customers who deploy our email data protection and for good reasons. Healthcare and financial service manage an abundance of protected health information and personal financial information, and they are heavily regulated industries. Meanwhile local, state and federal government organizations must protect sensitive information to meet government standards and maintain public trust. However, the customer trend is beginning to shift with increasing data breaches that are affecting millions of people. Businesses...
Read More

Board Communications: A Better Security Approach to Managing Data Risks

Wed, 09/25/2013 - 11:00 by Jim Brashear
Thomson Reuters recently published its 2012 Board Governance Survey Report, Meeting Expectations of Board Governance: Board Oversight, Communications and Technology in a Global Landscape . The report notes the increased workload for the Corporate Secretary. On average, among responding corporations, 92 board books are created annually – each an average of 116 pages. That’s over 10,000 pages of board materials per year! Much of that material is sent to outside directors and advisors electronically. A disturbing aspect of the report is "a surprising absence of security measures taken in board...
Read More

Law Firm: Cryptography is Going Mainstream

Wed, 11/07/2012 - 10:30 by Jim Brashear
On the Privacy and Security Matters blog sponsored by the Mintz Levin law firm, Sara Crasson has a great observation about the growing use and importance of encryption to protect sensitive data - including sensitive data in email. The Internet has become a primary medium for everyday communication, but individuals rarely consider the potential data security problems. Sending an e-mail or instant message is like dropping a postcard in the mail. Many people handle a postcard as it travels to its final destination, and a message can be seen, copied, and misused. E-mails have the same risks,...
Read More

Boilerplate Confidentiality Notices in Email - Why Bother?

Thu, 09/20/2012 - 16:18 by Jim Brashear
Recent conversations on the Association of Corporate Counsel message boards have considered whether there is any value in appending to emails an automated notice to the effect that the contents may be confidential or privileged. Law firms typically include those notices at the bottom of emails. Here's a typical example: This electronic message is confidential and is intended only for the use of the individual to whom it is addressed. The information may also be legally privileged. This transmission is sent in trust, for the sole purpose of delivery to the intended recipient. If you have...
Read More

Pages

Subscribe to RSS - Legal Industry

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More