5 01, 2023

Demonstrating the Value of In-House Legal Through Self-Service

2023-01-24T10:37:33+01:00January 5th, 2023|Blog|

If you want to develop an app, you would think you need programming knowledge. Traditionally, software is "coded", i.e. written line by line in the form of software code. However, recently there’s another approach available: low code / no code development. This approach has the coding part already in place, enabling you to program with pre-defined functions and actions which you typically can drag & drop to build out your application. As a result, software development projects can also be implemented by end-users with little programming knowledge. In this blog we will explain to you what low code and no [...]

7 12, 2022

Low code and no code – Possibilities and advantages at a glance

2023-01-05T12:52:18+01:00December 7th, 2022|Blog|

Low code and no code  - Possibilities and advantages at a glance If you want to develop an app, you would think you need programming knowledge. Traditionally, software is "coded", i.e. written line by line in the form of software code. However, since a few years there’s another option available – low code / no code development. This approach has the coding part already in place, enabling you to program with pre-defined functions and actions which you typically can drag & drop to build out your application. As a result, software development projects can also be implemented by [...]

8 09, 2021

Four tips for having confidential internet communication with your clients

2023-01-05T12:52:19+01:00September 8th, 2021|Blog, News|

Four tips for having confidential internet communication with your clients The vast majority of data intrusions happen when someone clicks on a link in an e-mail or text message (phishing), provides a password or other information over the telephone to a so-called colleague, or by logging in while someone else is secretly watching (social hacking). Security starts with knowing how and where you are vulnerable. As a lawyer, you work by definition with confidential information. Information in your possession – both your own and your clients' – can be valuable to cybercriminals. The chance that you will become [...]

24 08, 2021

Different types of e-mail encryption and their benefits

2023-01-05T12:52:20+01:00August 24th, 2021|Blog, News|

Different types of e-mail encryption and their benefits Millions of e-mails are sent around the world every day. Emails are sent from server to server and are temporarily stored in the process. If they are unencrypted, attackers can read them on every server. E-mails can also be intercepted by criminals on their way from one server to another and their content can be falsified. Neither the sender nor the recipient will notice anything. E-mails with sensitive information should therefore be encrypted. During encryption, readable information (plain text) is converted into its illegible counterpart (ciphertext). The ciphertext can only [...]

10 05, 2021

What is Zero Trust? A model for more effective security

2023-01-05T12:52:21+01:00May 10th, 2021|Blog, News|

Recent research shows that companies in the DACH region and the UK are increasingly planning to implement Zero Trust solutions*. 52 percent of the IT security decision-makers surveyed want to start a project within 18 months using so-called software-defined perimeter technology. The reason for this is the ongoing cloud computing trend. What is Zero Trust? The Zero-Trust-Model is a security approach in which a strict check of the user or the device is carried out regardless of its location in relation to the network. By restricting who gets privileged access to a computer or [...]