Many Faces of Mike McBride

By Mike McBride | Much like my blog - about Litigation Support, Training, Technology, Travel, Social Media, Careers and any other thing I think of!

Linked - Deutsche Bank Bans Text Messages, WhatsApp on Company Phones

They’re turning it off on company issued phones, but also – so much for that BYOD policy:<p>The policy also applies to private phones used by employees …

Linked - Why open offices are bad for us

Even the BBC is getting on board with the fact that the open office space movement might just have been a horrible idea. But how many organizations …

Linked - FTC sues IoT manufacturer for failure to secure devices from cyberattacks!

“This lawsuit was the FTC’s stern message to other IoT manufacturers, and surely we will see more such lawsuits!”<p>There’s no question the FTC is …

The Kids Might Be Learning Faster About How to Use Social Media

As I mentioned yesterday, the article about how college admission folks do, in fact, check online profiles of potential students, there was another …

Litigation Hold Triggers and the Duty to Preserve Evidence

For a party to meet its obligation to produce relevant evidence during the discovery phase of litigation, they must first meet their obligation to …

Government

America Needs a Cybersecurity “Reboot”

Posted: Jan 18, 2017 12:01 AM<p>A generation ago, as Americans began logging onto the earliest versions of the internet, McAfee antivirus alerts were as …

Cybersecurity

Linked - Cartapping: How Feds Have Spied On Connected Cars For 15 Years

Image by Ericsson Images<p>So, if you have a car with satellite radio, or OnStar, law enforcement has been able to get a warrant to have those companies …

A Changing World: Ralph Losey on “Stepping In” for e-Discovery

How can attorneys “step in” with technology, engaging with new systems to better understand and improve them? We sat down with Ralph Losey to get his …

How safe is Federal IT? Millennials more likely to trade caution for digital productivity

According to security firm Forcepoint, millennial's behaviour poses significant risk to federal IT systems<p>Studies from Austin, Tx. based global …

Security

Social Media Matters to Professionals, and Students

If you’ve been around the blog for any time at all, I’m sure you’ve seen me talk about the importance of having an online presence that you control …

Client Confidentiality Personal Privacy

Client Confidentiality, Personal Privacy and Digital Security<p>By Jim Calloway<p>We have just emerged from a presidential election that led to more …

Security

Linked - E-Discovery in Action: How VW's In-House Lawyers Screwed Up a Litigation Hold

“The statements say VW in-house attorneys tipped off employees about an oncoming litigation hold. And at least one in-house counsel apparently …

5 New Year Resolutions from an Experienced eDiscovery Team

With each New Year comes a plethora of new gym memberships, healthy eating, better budgeting and countless other goals that individuals set for the …

Forensics

Linked - I'm Just a Low-Level Employee. I Don't Need a Personal Brand

“Don’t over-think the term personal brand. Your personal brand is simply a trendy term for reputation. Of course, today your reputation is primarily …

Phone-Hacking Firm Cellebrite Got Hacked; 900GB Of Data Stolen

The company that sells digital forensics and mobile hacking tools to others has itself been hacked.<p>Israeli firm Cellebrite, the popular company that …

Linked - Demand for secret messaging apps is rising as Trump takes office

““When we talked about the revelations of Snowden, it was hard to convince some folks on the progressive side to care,” said Josh Levy, advocacy …

Legal tech companies make selling to law firms tough on themselves - Real Lawyers Have Blogs

Many legal tech companies bemoan the difficulties of selling technology to law firms when law firms are so far behind the times.<p>In reality, it’s …

Marketing

Place to Rest?

Not sure if the people who lived nearby used this to hang out, or if they out it there for hikers to rest.

Linked - Can you Recognize a Phishing Message?

“Training is a big part of protecting yourself from phishing attacks. There are a lot of ways to train employees, but giving them a phishing test is …

Linked - NSA Given More Ability to Share Raw Intelligence Data

“From a privacy perspective, this feels like a really bad idea to me.”<p>Image by Jared Kelly<p>I agree. We all pretty much know the NSA is snooping on us, …

Looking to Start or Further Your E-discovery Education 3 Ways to Get There

• 5 free articles* from across the ALM network every 30 days<br>• Unlimited access to Corporate Counsel and Legaltech News online<br>• Legaltech News digital …

Female and Her Cub

Making and questioning various e-discovery requests

No one, even if they have nothing to hide, fancies the idea of relinquishing their data to a total stranger, only to wait for that data to be …

Security

Linked - Mac help and support

So if you’ve got a Mac running OS X or macOS Sierra, this Mac help and advice guide collection will tell you everything you need to know.<p>This …

Linked - How to Network

Image by ccPixs.com<p>“Networking may not seem all that important in the crush of the daily to-do list, until you need a network to call on. Then, it …

E-Discovery Jobs in Demand in 2017

The rising tide of eDiscovery will lift the prospects for many job-seekers surfing the web in 2017. According to a new report, eDiscovery will create …

Forensics

Linked - Medium says it can’t make money selling ads so it’s laying off a third of its staff

In a blog post shared on Wednesday, Williams said he wants to move away from ad-supported content, which is how most stuff on the internet generates …

Five Tips To Avoid Mistakes In Electronic Document Review

These tips are based on a long life of litigation legal practice, including thousands of document reviews going back to 1978. I have seen hundreds of …

Computer Forensics

Linked - Privacy Laws will likely cause conflicts with Big Data in 2017

Big data and privacy rights have always been in conflict, with the growth in data collection, this conflict will be central to our relationship as …