Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Weekly eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!
EMAIL ADDRESS



Upgrade to Premium Membership NOW for Just $90!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
COMPLIANCE

How to give your analog workplace harassment policy a digital makeover

One of the only nice things about the pandemic is the relief it’s provided from workplace harassment. After all, employees are far less vulnerable to workplace harassment when they work from home. Right? Absolutely wrong!!! Since the pandemic began: More than 4 in 10 U.S. workers (41 percent) reported that they’ve been subjected to some form of digital harassment (Pew Research); Nearly half (45 percent) of women experiencing sexual harassment say it happened remotely (Rights of Women, UK and Wales (“ROW”)); 23 percent of women reporting that they’ve been harassed say the problem has actually gotten worse since they began working from home (ROW); and More than 7 in 10 (73 percent) of victims say they don’t think their employer is doing enough to protect them from remote harassment (ROW)…. . . . read more

CYBERSECURITY

5 unintended ways companies compromise their network security

By Ron Slyker Solid organization security is a considerable necessity in today’s world—that’s not going to come as a surprise to anyone. Nonetheless, making and keeping an impenetrable organization is something that stays a slippery objective for some enterprises. Organizations of all sizes are continuously struggling with the battle of guaranteeing that each potential security gap is sealed securely. Most organizations are coming up short with attempting to guard their organizations, making them defenseless against data theft and malicious network invasion. To feature exactly how genuine this issue is we will diagram five of the main manners by which endeavors are accidentally bargaining their organization security, and exactly how they can fix these oversights. Sole reliance on VPNs as a security bandage Virtual Private Networks (VPNs) assume a significant part… . . . read more

CYBERSECURITY

5 tips to keep your cloud data secure

By Ron Slyker bio The trick to avoiding a cloud data security breach is to pay close attention to your cloud applications and user behavior. While analyzing the software and looking at user behaviors takes time, the benefits of reducing cloud and data security breaches make it worthwhile. Examine user activities It is vital to know not only which apps you use, but also how they use your data. Determine which apps the employees use to share content and whether they have a sharing feature. Knowing who is sharing what and with whom will assist you in deciding the right policies to use. 2. Users should be moved to high-quality apps Cloud-switching is fairly inexpensive, if you find an application that would work better for you, you can always migrate… . . . read more

PRODUCTIVITY

8 ways to cut the chaos on Zoom

By Lynne Curry bio Question: Our department’s weekly Zoom meetings are a train wreck. One coworker’s kids pop their heads in front of the screen and wave “hello.” Another guy’s kids are on the other side of the table from where he sits, and they interrupt him when he’s talking to argue with him. I’m obligated to attend these meetings. Any advice would be appreciated. Answer: Every train needs a conductor; yours appears to be asleep at the wheel. Zoom meetings go off the rails when those who attend forget that while they’re at home, they’re also at work. If you ask every attendee to observe eight guidelines, it might get your meetings back on track. Professionalism: Please demonstrate professionalism as well as comfort in your attire. Use your video… . . . read more

Telecommuting

Cybersecurity risks rise when law office staff works from home

By Ron Slyker The number of people who work from home has slowly increased from year to year. In 2020 that number skyrocketed as companies including law offices were forced to implement telecommuting policies. Making the transition from traditional office to home office has brought some challenges, but arguably the most challenging aspect of the process has been maintaining cybersecurity. Now in 2021 the need for remote worker security is more important than ever. Keep yourself safe with network security assessments Employees who work from home are more susceptible to cyber threats than employees who work in the office. The reason is businesses can afford enterprise-level cybersecurity services. The average home not only does not have access to this level of security but may also lack basic security measures. When working from… . . . read more

CYBERSECURITY

Disinformation endangers your company, not just democracy

By Doug Striker bio Did you hear about the rumor that COVID-19 was spread by mobile devices using the 5G network? It sounds so insane and far-fetched that no one would believe it, right? I mean, how in the world would a virus travel through a cell phone frequency band, into a cell phone or tablet, and then out of the device into a person’s body? But thanks to social media, fake news sites set up by bad actors, and Average Joes (like you and me) who click that “share” button all too readily, the rumor spread like wildfire, gaining so much traction that people were literally lighting cell phone towers on fire around the world. Why would someone spread such nonsense? And when I say “someone,” I not only… . . . read more

TELECOMMUTING

8 pitfalls of letting law firm employees work from home

Contrary to what you might have heard in HR circles, refusing to let employees work from home will not make your law firm a dinosaur that nobody will ever want to work for. In fact, it will put you in the same position as the nearly 65 percent of…


. . . read more

BLOG

10 ways to spot a phishing email

By Jay Stromberg  bio
There is no such thing as a 100% fool-proof security system that can protect your law firm from phishing emails. And that’s pretty alarming because phishing is now…


. . . read more

HIRING

How to detect a lie, especially when it comes from a job applicant

Lots of lying goes on in job interviews. Some management professionals estimate that as many as 70% of job applications carry some…


. . . read more

YOUR CAREER

10 ways managers are improving their law firms

Ah, the woes of running a law office. You know them well: Reams of reports, scheduling squabbles, technology tangles, and so much more. It takes a lot of skill, patience, and strategy to make a…


. . . read more


(-0)