Peer to Peer Magazine

Fall 2014: Security Is Everyone's Business

The quarterly publication of the International Legal Technology Association

Issue link: http://read.uberflip.com/i/411912

Contents of this Issue

Navigation

Page 91 of 91

WWW.ILTANET.ORG 93 AccessData . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Aderant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 BEC Legal Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71, 72 Capensys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 DocAuto. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 DocsCorp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Intelliteach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Keno Kozie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Legal Anywhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Lexbe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Litéra . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Litigation Support Today . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Mobile Helix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 NetDocuments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Opus 2 International . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Prosperoware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 54 Savvy Training & Consulting, Inc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Thomson Reuters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Thomson Reuters Elite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Tikit North America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Traveling Coaches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18, 86 Venyu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Worldox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Ad Index DISCLAIMER This report is designed for use as a general guide and is not intended to serve as a recommendation or to replace the advice of experienced professionals. If expert assistance is desired, the services of a competent professional should be sought. Neither ILTA nor any author or contributor shall have liability for any person's reliance on the content of or any errors or omissions in this publication. COPYRIGHT © ILTA 2014 All rights reserved. Printed in the United States of America. No part of this report may be reproduced in any manner or medium whatsoever without the prior written permission of ILTA. Published by ILTA. c/o Editor, 9701 Brodie Lane, Suite 200, Austin, Texas 78748 This publication is printed on 65# Utopia II Matte CV and 60# Flo Matte BK that is FSC ® certified and is 10 percent postconsumer content. The inks are walnut oil-based and completely recyclable: Think Green — pass this issue to a colleague ENCRYPTION FOR EMAIL Most technology tools and services must have something added to make them encrypted. For example, HyperText Transfer Protocol (HTTP) does not become protected until the security (the SSL) is added, making it HTTPS. Anything you send via email is typically in plain text and is readable by any intermediary. It's only if you scramble the data (or encrypt it) that it becomes secure between source and target or sender and recipient. Google and Apple recently started encrypting their email traffic internally, but that only protects email messages within their domains (i.e., if you are messaging someone without an @gmail or @mac email address, it will still be sent in plain text). EVERY MEASURE COUNTS We can't make information 100 percent secure 100 percent of the time. However, if you are transferring client data (such as the Social Security information for 26 million American citizens), an encrypted container will likely obfuscate the true value of the data and prevent 99 percent of intruders who might try to open it if lost or stolen. If you practice encryption by default and work it into your routine, you never have to worry about whether you "locked" the data. It will always be locked. Within the legal world, reasonable steps can be taken to enable a level of security that far surpasses the needs of most clients. What tools are easy to implement and use? • At the most basic level, install Virtru into FireFox or Chrome, and enable secure email messages through your webmail. It's free, and you can start using it with three clicks. • You can easily encrypt attachments using WinZip software. This is not as secure as other tools, but it is popular and easy to implement. • Pretty Good Privacy (PGP) is the most widely used encryption program, and it is easy to use. You can learn the free version at gnupg.org or pay for the easier-to-use commercial version at pgp.com. • Two other great tools include Password Safe (originally developed by the rock star of cryptography, Bruce Schneier) and Microsoft Bitlocker. There's an entire community of development around encryption, and new advancements are on the rise. It's time to implement proper encryption practices. The software is available, free (or a nominal cost) and easy to use. What are you waiting for? BY PHIL WELDON

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Fall 2014: Security Is Everyone's Business