Winning the wi-fi game

Last year, during Super Bowl LIII, over 24 terabytes of data was transferred by more than 38K users within Mercedes-Benz stadium. That is a 47% increase from the year before; the equivalent of 28 million selfies, 4.8 million songs, and 960 days of touchdown dance videos. According to Extreme Networks, the official wi-fi solutions provider for the Super Bowl, fans … Read More

You Can’t Protect Data You Can’t Find

New and emerging privacy laws have ratcheted up the pressure on organizations to protect customer and employee data better.  With corporate data volumes increasing by 62% every year, it’s becoming more difficult and more expensive to protect sensitive information.  Further compounding the problem, a recent survey by Gemalto found that only 54% of companies know where all their sensitive data … Read More

a webinar: eDiscovery and Information Lifecycle Trends

2019 Year in Review and Predictions for 2020 As technology continues to advance, the sheer volume, variety, and complexity of data has increased at an exponential rate. With this surge of electronically available information, the implications for corporations, law firms, and service providers are constantly changing and evolving in response. Effectively navigating these trends and preparing for the emerging legal … Read More

How to prepare for emerging trends in eDiscovery and the Information Lifecycle

It’s a busy time for corporations and law firms monitoring eDiscovery and information lifecycle trends, and that’s sure to continue in 2020 and beyond. Innovative Discovery (ID) recently hosted a webinar to discuss trends and hear from industry experts about preparing for what’s ahead. Representatives from Goldman Sachs, Seyfarth Shaw LLP, Gannett Media Corp., and ID first identified key trends … Read More

Don’t let the internet spoil a surprise.

January 9, 2020 Online shopping offers the perks of a larger selection of potential gifts, a way to quickly compare prices, and the time savings of making purchases from anywhere. Choosing gifts online, however, can spoil a well-thought-out surprise and haunt you with ads that could feel like the Ghost of Christmas Past. Personalized online ads, also known as “targeted,” … Read More

How to avoid a “touchless hack”

December 12, 2019 Becoming a successful hacker might depend more on a person’s knowledge of psychology than on their expertise in information technology, according to cybersecurity experts. A hack doesn’t necessarily require manipulation of a company or organization’s network connections or systems. It’s often accomplished with clever social engineering, or more simply, deception. Social engineering – attempting to influence someone … Read More

Maintaining Network Security During the Holiday Shopping Season

December 2, 2019 No matter how many employees you have, it’s likely that some of them will be shopping during the Black Friday/Cyber Monday holiday. As sales start to creep up earlier every year, some of this shopping will probably be done on company time and on company computers. Every company needs to set limits on how much personal usage … Read More

Don’t Miss the Remote Security Boat

November 7, 2019 Remote work provides many benefits to employees, employers, and the environment in the form of boosting worker productivity and efficiency, helping to attract and retain employees, lowering overhead, and reducing vehicle emissions, among other advantages. But the growing trend also brings its share of challenges, from data leaks, security gaps, and lack of accountability. In 2016, about … Read More

How to Protect IP in Today’s Big Data World

October 30, 2019 Companies rely on big data and big analytics to improve and develop their products and services as well as boost their profits.  “Today, big data has become capital,” notes tech giant Oracle Corp. in an online white paper on big data. “Think of some of the world’s biggest tech companies. A large part of the value they offer … Read More

FedRAMP: the gold standard for CSP security

October 10, 2019 On retail websites, an SSL (secure sockets layer) certificate symbol signals to consumers that the credit card data they input will be encrypted during delivery to the retailer. Similarly, certification under the Federal Risk and Authorization Management Program (FedRAMP) provides an attestation of quality concerning the security of cloud service providers (CSPs). But unlike SSL, which is … Read More