Blog

  • Recent

    • Working From HomeSample Emergency Work from Home Policy
      This sample Emergency Work From Home (eWFH) policy is presented to Just-Tech clients and other legal services organizations to modify and use as necessary during this time.  Please note that this document contains language and provisions that may or may not apply to your organization, and should be adapted as necessary to fit your organization’s needs.  This document is provided as a guideline, and should not be taken as legal advice.  Please review and consult with your General Counsel and/or executive leadership prior to use. Purpose This policy does not reflect the normal work from home ...

2018 New York Statewide Civil Legal Aid Technology Conference

Posted by on May 29,2018

Join Just-Tech at the 2018 New York Statewide Civil Legal Aid Technology Conference! Convened by the NYS Permanent Commission on Access to Justice, with the assistance of NYSTech, this conference will bring together leaders and technologists from legal aid providers, private law firms, law schools, corporations and the Judiciary to promote collaborative, innovative and sustainable […]

Read More

Security for a Civil Society

Posted by on May 11,2018

The Ford Foundation recently partnered with The Engine Room to conduct research on the current state of digital security within the civil society community. The report is broken into three sections: The Contextual Nature of Security – which discusses “basic understandings of digital security, consider[s] political contexts, and take[s] a brief look at current and […]

Read More

NYC Announces City’s First-Ever Cybersecurity Initiative

Posted by on April 6,2018

Via NYC.gov: Mayor Bill de Blasio has a announced “NYC Secure“, New York City’s first ever cyber-security initiative. NYC Secure will defend New Yorkers from malicious cyber activity on mobile devices, across public Wi-Fi networks, and beyond. The first NYC Secure programs will include a free City-sponsored smartphone protection app that, when installed, will issue […]

Read More

Facebook, Privacy, and What You Need to Know

Posted by on March 27,2018

Last week, New Zealand student and technologist Dylan McKay downloaded his entire Facebook archive to see just how much data the company had harvested from. To his surprise, he discovered that not only had Facebook collected the identities of his friends and family from his address book, but that, for a short period between 2016 […]

Read More

In Just 24 hours, 5,000 Android Devices are Conscripted into Mining Botnet

Posted by on February 6,2018

Via Ars Technica: A new internet worm emerged over the weekend that took less than 24-hours to infect Android devices such a smartphones and TV boxes. Once infected, the devices began mining the Monero brand of crypto-currency, and seeking additional devices to infect: Once infected, Android phones and TV boxes scan networks for other devices […]

Read More

More Than 2000 WordPress Sites Found to be Infected With Key-Logging Malware

Posted by on January 30,2018

The security desk at Ars Technica is reporting on a new attack where more than 2000 WordPress sites were infected with malware that can capture keystrokes (and passwords) within the administrative control panel. It also installs an in-browser crypto-currency miner that hijacks the computers of site visitors to run silently in the background. Side effects […]

Read More

Meltdown and Spectre: The Pain Has Only Just Begun

Posted by on January 12,2018

Ars Technica has published an excellent in-depth article detailing how the upcoming software and hardware patches designed to deal with the Meltdown and Spectre vulnerabilities will likely have a negative impact on computer performance. To recap: modern high-performance processors perform what is called speculative execution. They will make assumptions about which way branches in the code […]

Read More

Just-Tech Will Be the LSC Innovations in Technology Conference

Posted by on January 9,2018

Heading down to New Orleans for LSC’s Innovations in Technology Conference this week? Be sure to be on the lookout for Just-Tech’s Founder and President, John Greiner, and Senior Consultant, Anna Steele. On Tuesday, Anna will be participating in the pre-conference hackathon, and John will be joining members of the legal services technology community in […]

Read More

I.T. Spending versus Budgeting

Posted by on January 2,2018

As a IT professional, working for many different types of companies and organizations, you get the feeling you’re a bird on the window sill, peering in, observing the culture, watching the daily workflow; not fully understanding it, yet somehow a part of it, unseen in the background. Over the course of the past twenty years, […]

Read More

Web Trackers Exploit Browser Login Managers

Posted by on December 29,2017

Another day, another online hack, or so it seems. Whether it’s the Yahoo! password grab, or the Equifax data breach, we know that we need to secure our passwords online. Just when you thought you had done everything to be save online, we now learn of one more way your data is not safe. A […]

Read More