The middle of summer is a great time for tackling projects that you can't get to during the rest of the year. Here are a few suggestions: Ensure that data security is covered in your employee handbook, employee training, and BYOD policy. Include computer files as part of your summer office clean-up. Start planning for the last quarter of the year in terms of collections … [Read more...] about To-Dos: Your August office checklist
Technology
How simple technology solutions can make your job astonishingly easier
As a law office manager, there likely are many days when you are frantically running around trying to make plays, getting blindsided by distractions, and sometimes even losing track of the plays you should be making. However, with the proper application of technology and processes in your day, you can feel as though you are confidently running the ball, are in control, … [Read more...] about How simple technology solutions can make your job astonishingly easier
What does it mean to be a competent lawyer?
By Doug Striker bio Let's say you're looking for a lawyer to handle a rather complicated family matter. A friend recommends a lawyer whom he says is a legal genius, who works hard for his clients, knows the law inside and out, has a knack for finding legal loopholes, never loses a case, digs hard to get all the facts and looks under every rock. You're very excited to … [Read more...] about What does it mean to be a competent lawyer?
Want to improve attorney tech use? Start by breaking down silos in your firm
By Michelle Spencer bio I have long wondered why there are two different teams in law firms doing similar functions. I am referring to the professional development and technology training teams. Both of the teams perform learning and development functions, and yet they are usually in two different departments that work alone, except in rare instances. They … [Read more...] about Want to improve attorney tech use? Start by breaking down silos in your firm
How to protect your client data while complying with PCI anti-fraud measures
What would you do if you were asked to install monitoring software on your network? Gary Allen Gardner of Rosi & Gardner, P.C. in Traverse City, Michigan, shares how he resolved a recent troubling request his firm received. We were contacted by our credit card processing company, regarding "PCI Compliance" (Payment Card Industry). By email and subsequent list of … [Read more...] about How to protect your client data while complying with PCI anti-fraud measures
How secure is your password? Are you sure?
Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, says a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to be roughly as secure as iloveyou88; one said "both are a combination of dictionary words and are appended by … [Read more...] about How secure is your password? Are you sure?
San Diego firm gets more cash faster with easy-to-use online credit card payment system
It can be pretty daunting to introduce a new feature on your website, especially one that involves financial transactions. But when it came time to update the website for San Diego law firm Marks, Finch, Thornton & Baird, LLP, and start offering clients the ability to pay their bills online, the only thing that really caught firm administrator Linda Quindt off-guard was how … [Read more...] about San Diego firm gets more cash faster with easy-to-use online credit card payment system
Busting 7 common information security myths
Commonly held myths about information security can lead to a potential data breach and ultimately have a big impact on a company's bottom line and reputation. However, these breaches can be avoided when businesses provide their employees with the right training and tools to separate fact from fiction and responsibly manage confidential information. A recent study shows that 23 … [Read more...] about Busting 7 common information security myths
Information Security Checklist for Small Businesses
Why you need this checklist: This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address. How this checklist helps you: This checklist will help you pinpoint your cybersecurity policy's strengths and weaknesses. How to use this checklist: Print off this checklist and review it with members of your cybersecurity … [Read more...] about Information Security Checklist for Small Businesses
Cyberthreats demand your attention and a customized approach
The recently released BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyberthreats and to have enterprisewide tactics in place to address intrusions before they happen. At the same time, Dell just released the … [Read more...] about Cyberthreats demand your attention and a customized approach