How to train your staff on cyber security (and make it stick)

From: PC World, By , December 18, 2014

A strong security policy is one thing. Employees’ actual security behaviors are often quite another. In the complex and rapidly changing world of cyber security, experts say that training is essential to keep workers up to speed – and ensure your business stays safe.

How do you teach employees security tactics, and make sure they actually utilize them? Try these five tips to start: <READ MORE>

Millennials want personal health records on the go

From: Healthcare IT News, by Mike Miliard, Editor, December 17, 2014

Could younger patients be the key to achieving Stage 2 meaningful use patient access requirements? A new report finds strong desire for online medical records among the 18- to 34-year-old generation, with 43 percent of millennials saying they want to access their portals via smartphone.

In its fifth annual survey on the usage of electronic health records, Xerox sees more and more Americans expecting and demanding online access to health data. While aging Baby Boomers are showing keen interest in online access, Millennials are also increasingly expecting they can see their medical information where and when they want it. <READ MORE>

Chrome Plans to Mark All ‘HTTP’ Traffic as Insecure from 2015

From: The Hacker News, Tuesday, December 16, 2014

Google is ready to give New Year gift to the Internet users, who are concerned about their privacy and security. The Chromium Project’s security team has marked all HTTP web pages as insecure and is planning to explicitly and actively inform users that HTTP connections provide no data security protections. There are also projects like Let’s Encrypt, launched by the non-profit foundation EFF (Electronic Frontier Foundation) in collaboration with big and reputed companies including Mozilla, Cisco, and Akamai to offer free HTTPS/SSL certificates for those running servers on the Internet at the beginning of 2015. <READ MORE>



ILTA’s 2014 Technology Survey: An Early Holiday Gift for the Legal Tech Community

From: Inside Legal, December 4, 2014

Now that Black Friday and Cyber Monday are behind us, the best deal we see this holiday season comes from the International Legal Technology Association (ILTA) with their annual report, ILTA’s 2014 Technology Survey. This granddaddy of legal technology deployment & usage benchmarks has it all … 454 law firms (33% of the ILTA membership representing more than 106,000 attorneys and 217,000 total users) responding to almost 200 questions about what technologies they are using to run their firms; expert commentary by ILTA staff and member firms to support the findings and useful technology trending and ‘un’ trending info based on ‘compare and contrast’ exercises with previous survey editions. And, oh yeah, if that hasn’t sold you already, the entire 300 page PDF ‘opus’ is free of charge … a more than gracious ILTA legal technology community service gesture.

While we have not had the chance to dive in to the freshly published (released to ILTA members today!) findings, we did receive some survey themes from ILTA’s executive director and tech survey ‘MC’ Randi Mayes worth sharing here:

Security: ILTA has seen a strong trend in security over the last few years, and it continues in 2014. Initiatives like security audits and web filtering have become the norm (now at 73% and 81% of responding firms, respectively,) and hard drive encryption (now above 50%) are becoming much more common. As the survey executive summary notes, to a large degree, firms’ security agendas are being pressed by clients and regulators, and the recent government privacy and security sanctions of blue chip financial services and telecommunications companies will only accelerate security as priority #1. <READ MORE>

In Brief: Dropbox and Microsoft Partner Up

From: Law Technology Today, Posted by: Gwynne Monahan November 4, 2014

If you’ve ever been to #MILOfest, you may have wondered why Dropbox doesn’t sponsor it. Talk to lawyers at a tech conference, and you hear it just as often. It is arguably the preferred file-sharing and storage app for lawyers. Microsoft Office is still dominates, too, so a partnership between the two is exciting. <READ MORE>

Social Media Blunders You Don’t Want to Make

From: Intuit QuickBooks, by Brandi-Ann Uyemura on December 1, 2014

Social media can be a double-edged sword for businesses. Using it intelligently can help you engage with customers on a level that other marketing tactics can’t match. But that doesn’t mean you shouldn’t be strategic — and judicious — about what you say and how you say it on your website, blog, and social media channels. How do you stop social media mistakes from damaging your brand? Learn from these organizations’ damaging gaffes. <READ MORE>

Data breach trends for 2015: Credit cards, healthcare records will be vulnerable

From: PC World, Tony Bradley@tonybradleybsg, Dec 3, 2014

The data breaches of 2014 have yet to fade into memory, and we already have 2015 looming. Experian’s 2015 Data Breach Industry Forecast gives us much to anticipate, and I’ve asked security experts to weigh in with their thoughts for the coming year as well.

Experian highlights a number of key factors that will drive or contribute to data breaches in 2015. A few of them aren’t surprising: Organizations are focusing too much on external attacks when insiders are a significantly bigger threat, and attackers are likely to go after cloud-based services and data. A few new factors, however, merit your attention.

First, there is a looming deadline of October, 2015 for retailers to upgrade to point-of-sale systems capable of processing chip-and-PIN credit cards. As banks and credit card issuers adopt more secure chip-and-PIN cards, and more consumers have them in hand, it will be significantly more difficult to clone cards or perpetrate credit card fraud. That’s why Experian expects cybercriminals to increase the volume of attacks early in 2015, to compromise as much as possible while they still can.

The third thing that stands out in the Experian report is an increased focus on healthcare breaches. Electronic medical records, and the explosion of health or fitness-related wearable devices make sensitive personal health information more vulnerable than ever to being compromised or exposed. <READ MORE>

Windows 10 could prompt upgrades of 600 million aging PCs

From PC World: by Agam Shah@agamsh, Dec 2, 2014

Microsoft’s Windows 10 is still in testing, but hardware makers can’t wait for the day the OS replaces the controversial Windows 8.

Millions of PCs are aging, and those who have resisted Windows 8 will likely upgrade to computers with Windows 10. The initial reception to a test version of Windows 10 has been positive, as it resolves many usability issues affecting Windows 8.

There are about 600 million PCs that are four years or older, and those systems are ripe for upgrades, said Renee James, president at Intel, at the Credit Suisse Technology Conference on Tuesday.

“When we see a healthy macroeconomic environment and an aging installed base we expect a new [OS] deployment. The [PCs] are fantastic and at new price points. That’s kind of a perfect storm, combined with a new OS, and the OS usually pushes the upgrade cycle,” James said.

James is “very enthusiastic and optimistic” about what Microsoft is doing with Windows 10.

“They’re being extraordinarily responsive to customers,” James said.

All major PC makers are expected to support Windows 10 when it is released early next year. Hardware makers are already customizing drivers and products for Windows 10. Advanced Micro Devices’ new PC chip, code-named Carrizo, will take advantage of new features in Windows 10. The chip maker is expected to detail those features early next year. <READ MORE>

5 Business Lessons I Learned While Running a 5K

From: Intuit QuickBooks, by Julie Gordon White on November 20, 2014

I recently ran (okay, mostly ran) a neighborhood 5K after many months since my last event. I’m a very experienced back-of-the-pack half-marathoner, but I tend to only run during the fall racing season, so this was my chance to get off my rear end for the first event of the year.

To keep my mind occupied on something more pleasant than the two-mile uphill climb I was trekking at the time, I started thinking about how recreational racing is similar to starting and growing a business. So after pulling over to re-tie my shoes for the second time (trying not to make it obvious that I needed a break), I brilliantly extended my resting period by noting five business lessons inspired by my 5K march.

Let’s see if they can help you along your own journey. <READ MORE>