Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Weekly eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!

Upgrade to Premium Membership NOW for Just $27!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives

Information Security Checklist for Small Businesses

Why you need this checklist:

This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address.

. . . download here


Cyberthreats demand your attention and a customized approach

The recently released BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to…

. . . read more


Should you outsource your IT department?

It’s a question many law firm administrators face at some point, particularly when discussing workforce restructuring: Is it time to…

. . . read more


Keep your firm and yourself cyber safe with some digital spring cleaning

The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) are encouraging consumers to get their online lives in good order by conducting a…

. . . read more


Don’t tolerate unethical behavior

By Steve M. Cohen bio

Why you need to draw a line
Some of the most difficult office decisions come down to ethics, and some of the most difficult ethical decisions often…

. . . read more


How to detect a lie, especially when it comes from a job applicant

Lots of lying goes on in job interviews. Some management professionals estimate that as many as 70% of job applications carry some…

. . . read more


Data breaches becoming more complex, pervasive, and damaging

Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting…

. . . read more


January 26 is Data Privacy Day. Learn how to safeguard your data

Do your employees how their information is collected, used, and stored by the devices, apps, and websites they use…

. . . read more


How to keep the office in business-as-usual shape after any kind of disaster

How disaster-prepared is the business side of your office? Although large organizations often have…

. . . read more


Gone phishin’: CyLab researchers find our ability to spot phishing emails is far from perfect

Each year, tens of millions of phishing emails make it to your inbox, uncaught by your email client’s…

. . . read more