Securely send sensitive information and files right from your email. Protect it further with two-factor authentication, automated data loss prevention rules, revoke after send, and digital audit trail.
Business Email Compromise (BEC) and Phishing scams continue to rise across all industries, but law firms have been getting hit particularly hard as of late. Current best practices for protecting your firm against such attacks [...]
Who is spying on your email? Spymail is a growing risk for email users in professional settings. Research indicates up to 40% of emails sent today contain hidden tracking. While most such spymails are [...]
In this CLE, we look at: Rules 1.1 (competence) and 1.6 (confidentiality of information) Technology overview of cloud computing Rules 1.1 and 1.6 applied to cloud computing Technology overview of email Rules 1.1 and 1.6 [...]