|  By Vijay Thampy - Senior Product Manager
We're working longer hours on increasingly confidential projects. There are newer data breach events occurring on a daily basis. Your clients are pushing new expectations on to your workflow with comprehensive Outside Counsel Guideline documents. ...

We’ve all done it. Sent the wrong email to the right person. Or the right email to the wrong email address. Scrabbling at your keyboard as you Del., Esc., Alt., Delete, anything to bring back that sensitive data winging its way through the World W...
 |  By Workshare
Why removing metadata is a must. Metadata can haunt the files you share each day, while you remain blissfully unaware of its presence. The thing is, it could give you a nasty shock were it to be revealed in the wrong place or to the wrong people....
 |  By Workshare
The General Data Protection Regulation (GDPR) is a new law that will come into effect on the 25th of May, 2018. Its primary goal is to strengthen and unify data protection for citizens of the European Union (EU). The GDPR replaces the Data Protect...
 |  By Curt Meltzer
Handling cybersecurity For several years, large law firms have been accused by the FBI and security consultants of being the weak link in the corporate security chain. While that may have been true 10 years ago, large law firms are now on equal f...
 |  By Alexis Fox-Mills
What makes up a Word document? Ever wondered just what makes up a Word document?  You're a normal person, so the answer to this is probably "No, I haven't". Now, we're not saying you need to become geeks like us and get all content crazy. But a...
 |  By Ainsley Whalen
When you share your documents and they leave the safety of your corporate network, you want to be sure you don’t accidentally share confidential information hidden in their metadata. Thankfully, it’s fast and easy to make sure your Word documents...
 |  By Alexis Fox-Mills
Highest risk from human error Through statistics obtained by Kroll from the Information Commissioners Office [ICO], we've taken a look at the biggest causes of reported data loss to businesses in the UK. The fear of cyber attacks may be high and...
 |  By Vijay Thampy
Protecting matter files shared by email New data privacy regulation is creating the need for ever tighter controls on how sensitive matter files are shared, coupled with stricter client audit requirements, law firms have some difficult security c...
 |  By Ainsley Whalen
This is for you, the CSIO, the Information Security Manager, the Lead Partner, the security admin guy or gal. This is for you, working over there in the IT team, the risk function, the Information Security group. You’re under pressure to secure s...