Highlights from ILTACON 2022 in National Harbor, MD20220831133622

Highlights from ILTACON 2022 in National Harbor, MD

August 31, 2022
About ILTACON 2022 This year, the International Legal Technology Association (ILTA) hosted its annual ILTACON conference...
TitanFile Introduces Customer-Managed Encryption Keys (CMEK) to Give Clients Complete Control Over Their Data20220822090024

TitanFile Introduces Customer-Managed Encryption Keys (CMEK) to Give Clients Complete Control Over Their Data

August 22, 2022
TORONTO, ON – August 22nd, 2022 – TitanFile Inc., a leader in secure file sharing serving law firms, financial service p...
3 Ways Secure File Sharing can Benefit Municipal Governments20220817135741

3 Ways Secure File Sharing can Benefit Municipal Governments

August 17, 2022
The need for secure file sharing and collaboration within municipal governments is stronger than ever. Due to the expone...
22 Best Practices for Protecting Data Privacy in 2022 [Infographic]20220809100956

22 Best Practices for Protecting Data Privacy in 2022 [Infographic]

August 9, 2022
Data Security Best Practices The current geopolitical climate has created a frenzy amongst online users regarding the sa...
How to Improve Communication with Clients: 3 Tips for Effective Communication20220805155944

How to Improve Communication with Clients: 3 Tips for Effective Communication

August 5, 2022
You’ve heard the term “Happy wife, Happy life” well the same applies to happy clients. Even the most j...
How Law Firms Prevent Email Data Breaches with TitanFile20220803090028

How Law Firms Prevent Email Data Breaches with TitanFile

August 3, 2022
How do email breaches occur? Legal professionals have a need to regularly exchange confidential information with clients...
How to Improve Cybersecurity and Privacy at Your Law Firm20220801090050

How to Improve Cybersecurity and Privacy at Your Law Firm

August 1, 2022
Your law firm is a gold mine for hackers. As cybercriminals, hackers look to steal as much data as possible in the short...
How to Create an Effective Cybersecurity Risk Management Plan20220729121440

How to Create an Effective Cybersecurity Risk Management Plan

July 29, 2022
Cybersecurity threats are at an all-time high. 1,862 data breaches took place in the past year, up more than 68% from 20...
What Does Encrypting an Email Do?20220727121556

What Does Encrypting an Email Do?

July 27, 2022
Encrypting an email means protecting potentially sensitive information from being read by anyone other than the intended...