Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Daily eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!
EMAIL ADDRESS



Upgrade to Premium Membership NOW for Just $90!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
PRODUCTIVITY

4 ways to use voice technology to save time

The expectations from today’s business professionals continue to increase with an ever-changing modern world. Heaps of documentation and document creation needs add on to often already heavy workloads. Yet, there is limited to no help managing administrative tasks. As a busy office manager, there are always work processes to be improved, time to gain, and more efficient ways to bring to screen and paper what needs to be documented. When handling our day-to-day work, we often don’t think of how we could work more efficiently and are caught up in outdated processes. We try to create our documents the most straightforward way we know—by typing them ourselves. But what if you could make a small change that could be a huge time saver? As suggested by Phillips Dictation SpeechLive, here… . . . read more

TECHNOLOGY

A primer on document management systems

Are you wondering how to modernize your office’s system of managing documents?  A document management system, or DMS, refers to the tools and processes your organization uses to store and manage documents. A modern DMS will often provide robust search capabilities, metadata tagging, access controls, and increased security processes to protect files. NetDocument, a cloud content management platform where legal professionals do work, offers this primer document management systems: In the past, document management meant a combination of filing cabinets, boxes, shelves, folders, binders, scanners, thousands upon thousands of printed pages, and designated square footage in the office to hold it all. Document management has evolved to align with today’s digital workplace by storing electronic  files and documents either in an on-premises or cloud-based DMS. These tools bring with them… . . . read more

CYBERSECURITY

How to stay vigilant without hiring a surprise attack ninja

Remember the Pink Panther movies? Peter Sellers’ character, Inspector Clouseau, hired “Cato” to randomly attack him. He thought unexpected ninja attacks would keep him every vigilant. While the over the top comedy is ridiculous, it does remind me of how to approach cybersecurity. You do not need to hire someone with a kendo stick to beat your staff into compliance, but frequent “reminders” do promote vigilance. This comparison comes from Mike Sacopulos, founder and CEO of the Medical Risk Institute. He said most professional practices provide cybersecurity training when an employee is first hired, and annually after that. While certainly this method will check the box for “security training” it is highly ineffective for maintaining good cybersecurity habits. Cybersecurity training is not a “once you learn it, you know how… . . . read more

MANAGING THE OFFICE

7 ways to cut costs with a greener office

By Daryll Esposito The well-being of our planet is a universal concern, but it’s not always front-of-mind when we’re busy at work. The good news is that making greener choices at the office is not only better for the environment, it’s better for your budget too. With Earth Day this week on April 22, it’s time to look at some environmentally friendly improvements. Some common repurposing and recycling advice is not appropriate for a law office, where confidentiality requires paper to be properly shredded for safe disposal.  On the other hand, the move to electronic documents greatly reduces paper use. 7 simple, sustainable and cost-saving steps that any office can take: Turn off electronics at night. You don’t pay your employees while they aren’t working, so why pay for off-duty equipment?… . . . read more

DATA SECURITY

Is your contact form providing a back door for cybercriminals?

By Doug Striker As automated email filtering gets better at screening for phishing attempts, criminals are responding by looking for attack techniques that evade those tools. Believe or not, their newest tactic is to fill out online contact forms and then use the response process to sneak malware into your system. By now, we are all familiar with email phishing. Most law firms today are conducting (or should be conducting) security awareness training across their organizations. And, as mentioned above, email filtering technologies have advanced and are quite good at stopping some attacks. But crime never sleeps, and cybercriminals have been creatively seeking new ways to infiltrate our systems. Contact forms and cybercrime A company called Abnormal Security has found that a nasty piece of malware called BazarBackdoor is being… . . . read more

ADVICE FROM THE WHITE HOUSE

Is your law office vulnerable to Russian cyberattacks?

The White House is urging businesses to review and improve cybersecurity because of a heightened risk of cyber attacks from Russia. A statement from the Biden-Harris Administration advises businesses to take the following steps: Mandate the use of multi-factor authentication on your systems to make it harder for attackers to get onto your system; Deploy modern security tools on your computers and devices to continuously look for and mitigate threats; Check with your cybersecurity professionals to make sure that your systems are patched and protected against all known vulnerabilities, and change passwords across your networks so that previously stolen credentials are useless to malicious actors; Back up your data and ensure you have offline backups beyond the reach of malicious actors; Run exercises and drill your emergency plans so that… . . . read more

INFORMATION SECURITY

Protect your data as Russia-Ukraine war increases cybersecurity risk

By Ron Slyker As part of the ongoing Russia-Ukraine conflict, Russian cyberattacks have primarily targeted Ukrainian government and bank systems, but the attacks may spread to countries outside of Ukraine soon. The Cybersecurity and Infrastructure Agency (CISA) and the FBI have warned organizations to increase protection as a precaution in case these attacks begin to affect the United States. Experts have reported known Russian cyber groups gathering information on U.S. infrastructure like electric and gas sites. While the FBI and CISA have received no warnings of direct threats to any Western countries, it is best to act now to protect your information. What can you do to protect your business from global conflict? Take action. Experts believe that any Russian cyberattacks would be disruptive, rather than intended to steal data, but… . . . read more

CYBERSECURITY

Are former staffers still accessing your firm’s accounts?

With the Great Resignation, workers are leaving in record numbers and the cybersecurity threat to employers is real. In a recent study, phishing-resistant multi-factor authentication (MFA) provider Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found a vast majority of employees (83%) admitted to maintaining continued access to accounts from a previous employer. The cybersecurity threat this poses is coupled with the fact that more than half of these employees (56%) said they had used this continued digital access with the specific intent of harming their former employer. Ongoing access to sensitive information paired with frequently malicious intent spelled disaster for these former employers. When the survey turned to focus specifically on responses from managers and business leaders, 74% admitted their… . . . read more

COMPLIANCE

How to give your analog workplace harassment policy a digital makeover

One of the only nice things about the pandemic is the relief it’s provided from workplace harassment. After all, employees are far less vulnerable to workplace harassment when they work from home. Right? Absolutely wrong!!! Since the pandemic began: More than 4 in 10 U.S. workers (41 percent) reported that they’ve been subjected to some form of digital harassment (Pew Research); Nearly half (45 percent) of women experiencing sexual harassment say it happened remotely (Rights of Women, UK and Wales (“ROW”)); 23 percent of women reporting that they’ve been harassed say the problem has actually gotten worse since they began working from home (ROW); and More than 7 in 10 (73 percent) of victims say they don’t think their employer is doing enough to protect them from remote harassment (ROW)…. . . . read more

CYBERSECURITY

5 unintended ways companies compromise their network security

By Ron Slyker Solid organization security is a considerable necessity in today’s world—that’s not going to come as a surprise to anyone. Nonetheless, making and keeping an impenetrable organization is something that stays a slippery objective for some enterprises. Organizations of all sizes are continuously struggling with the battle of guaranteeing that each potential security gap is sealed securely. Most organizations are coming up short with attempting to guard their organizations, making them defenseless against data theft and malicious network invasion. To feature exactly how genuine this issue is we will diagram five of the main manners by which endeavors are accidentally bargaining their organization security, and exactly how they can fix these oversights. Sole reliance on VPNs as a security bandage Virtual Private Networks (VPNs) assume a significant part… . . . read more


(-0)