Exterro's E-Discovery & Privacy Breakdown

The world of E-Discovery & Privacy is constantly changing – let us break it down for you with a weekly dose of News, Resources, Case Law, and Humor, all written in a concise and easy to understand format.

Friday Funnies: Exterro's Meme Series - Crazy Party Guy Who Doesn't Think His Company Will Get Hacked

Created on September 3, 2021


Chief Marketing Officer at Exterro

Have you ever heard someone in your organization say this to you? I bet you had the same look on your face, thinking, "man, this guy has no clue what he's talking about." As you know, it's not a matter of if but when, when it comes to data breach for your organization Be ready for when a data breach/hack occurs and learn more about Exterro Incident and Breach Management software.  Visit our entire catalog of E-Discovery Memes and Cartoons or download Exterro's Legal Meme Anthology 2020 and share the fun... Read More

Freeing Up IT Security Time With AI & Chatbots

Created on August 27, 2021


Director of Marketing, Exterro

Introduction With much of the world now pretty much gone virtual, businesses across America are trying to find new ways to reach out to both prospects and existing customers. Apart from the usual email blasts and other forms of digital marketing, the use of virtual assistants is now becoming a popular norm. For the most part, we have all seen this; it is that tiny window that is lurking at the lower-right part of the merchant’s website. With this, you engage in an instant dialogue with a customer service rep (CSR) on... Read More

What Is Ransomware?

Created on August 27, 2021


Marketing Manager, Exterro

In today’s world, cyber attacks are becoming much more covert and sophisticated. Gone are the days when an attacker would be content to stealthily deploy a Trojan Horse virus to see what is going on in your computer. Now they are intent on destroying an end user’s machine; sometimes launching Botnet style attacks in order to infect and destroy thousands of other computers in the process. What Ransomware Really Is The formal definition of ransomware is “…a type of malware that prevents or limits a user’s access to their computer system, either... Read More

Friday Funnies: Exterro's Meme Series - Oprah's Data Retention Strategy Giveaway!

Created on August 26, 2021


Vice President, E-Discovery

Did you know that data retention strategies are in such high demand because of new data privacy laws like the CCRA, VCDPA, GDPR? Even Oprah is giving them away because they are so badly needed to ensure compliance with these new laws. Learn how Exterro can make it also as easy as Oprah can for creating a data retention strategy with out easy to use software.  Visit our entire catalog of E-Discovery Memes and Cartoons or download Exterro's Legal Meme Anthology 2020 and share the fun with friends and colleagues! Remember... Read More

China's New Data Privacy Law: PIPL (Personal Information Protection Law)

Created on August 20, 2021


Senior Director of International Marketing

The Personal Information Protection Law (PIPL) is the new data privacy law in China, targeted at personal information protection and addressing the problems with personal data leakage. The first draft of the PIPL was submitted to the National People’s Congress of the People’s Republic of China (PRC) for review on 13 October 2020. There has been no official statement about when the law will come into effect. Industry figures suggest it could be as early as the start of 2022. The draft PIPL sets out civil, administrative and criminal rules that provide... Read More

How To Protect Against Asymmetric Cyber Warfare

Created on August 19, 2021


Written by Ravi Das, a business development specialist for the AST Cybersecurity Group, Inc. Introduction to Asymmetric Cyber Warfare When one thinks of a cyberattack taking place, many visions come to mind. Probably the most popular one is an individual dressed in a cloak-and-dagger outfit, sitting in front of a computer in a dark room, trying to enter a point of weakness in a business. While this particular image may not happen in reality, there is a new attack front that is emerging from this: This is known as “Asymmetric Cyber Warfare,” and... Read More

The Importance of Vendor Compliance Management

Created on August 18, 2021


Marketing Manager, Exterro

Introduction In today’s world of commerce, there are many links that exist between companies all over the world—like the suppliers and other external, third parties that you rely on, for example. For instance, if you manufacture products and distribute them into the marketplace, you will be dependent upon other entities to provide you with the raw materials, as well others to ensure that what you deliver to your customers is of high caliber. But with all these interconnections, any failure at one node can quickly cascade onto other parts of your manufacturing... Read More