By Dr. Marty Martin bio Wearable technology is hot! Wearable tech is also increasingly becoming cool and fashionable. Professional athletes and weekend warriors are outfitting themselves with devices to measure their heart rate, blood pressure, count their steps and calories, as well as track the quality of their sleep. With the health and performance of their … [Read more...] about Wearables at work: Leveraging technology to enhance work performance, engagement and balance
Technology
Are you changing your security strategy?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that's challenging for even the best prepared organizations, according to new research recently released by CompTIA, the IT industry association. "It's not that businesses need to be convinced that … [Read more...] about Are you changing your security strategy?
How to protect your data against costly and destructive cyber attack
Who is hacking into law firms? Are you at risk? How do security breaches happen? How to protect your data The downside of smartphones Planning for a breach At the law offices of Florrick, Agos & Lockhart, partner Diane Lockhart opens an email from a colleague and clicks on a link. As soon as she does, all the computers in the office go dark and a message pops up on … [Read more...] about How to protect your data against costly and destructive cyber attack
Top 25 new products for law firms
TechnoLawyer (TL) NewsWire, a provider of legal product reviews, has released its list of the Top 25 Products of 2014, based on lawyer and law firm administrator interest. Here are the products that got the most attention in 2014, with product summaries from TechnoLawyer founder Neil Squillante. 1. pdfDocs 4.1 The PDF format paved the way for the paperless law office, … [Read more...] about Top 25 new products for law firms
How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Get the presentation materials here Join our presenters Sharon D. Nelson, Esq., President, Sensei Enterprises, Inc. and John W. Simek, Vice President, Sensei Enterprises, Inc. and our moderator Catherine Jones, Editor of Law Office Manager as they discuss the rise in cyber crime, what it is, and how it is affecting your law firm. Here is just a sample of what they … [Read more...] about How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Leaky password managers on Android
By John Simek bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android
What tech toys are on your wish list this year?
By Catherine Jones bio In a recent edition of The Digital Edge, hosts Sharon Nelson, president of the digital forensics, information technology, and information security firm Sensei Enterprises, and Jim Calloway, director of the Oklahoma Bar Association's Management Assistance Program, reviewed approximately two dozen of their favorite tech toys for the holidays. Sharon and … [Read more...] about What tech toys are on your wish list this year?
Here’s what you missed at the ILTA 2014 Conference
Technology and training are the future for law offices, judging by the presentations and exhibits at a recent legal technology conference. When the 2014 conference for the International Legal Technology Association (ILTA) kicked off at Gaylord Opryland in Nashville, TN on August 17, Executive Director Randi Mayes felt like she was at a family reunion. "And," she says, "our … [Read more...] about Here’s what you missed at the ILTA 2014 Conference
The opportunities, concerns, and challenges related to adopting cloud services
According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services
Two quick tips from a cybersecurity expert
By John W. Simek bio 1. You are the product: default settings to “steal” your privacy data It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button. That seems to be what … [Read more...] about Two quick tips from a cybersecurity expert