Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Daily eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!
EMAIL ADDRESS



Upgrade to Premium Membership NOW for Just $90!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
MANAGING THE OFFICE

7 ways to cut costs with a greener office

By Daryll Esposito The well-being of our planet is a universal concern, but it’s not always front-of-mind when we’re busy at work. The good news is that making greener choices at the office is not only better for the environment, it’s better for your budget too. With Earth Day this week on April 22, it’s time to look at some environmentally friendly improvements. Some common repurposing and recycling advice is not appropriate for a law office, where confidentiality requires paper to be properly shredded for safe disposal.  On the other hand, the move to electronic documents greatly reduces paper use. 7 simple, sustainable and cost-saving steps that any office can take: Turn off electronics at night. You don’t pay your employees while they aren’t working, so why pay for off-duty equipment?… . . . read more

DATA SECURITY

Is your contact form providing a back door for cybercriminals?

By Doug Striker As automated email filtering gets better at screening for phishing attempts, criminals are responding by looking for attack techniques that evade those tools. Believe or not, their newest tactic is to fill out online contact forms and then use the response process to sneak malware into your system. By now, we are all familiar with email phishing. Most law firms today are conducting (or should be conducting) security awareness training across their organizations. And, as mentioned above, email filtering technologies have advanced and are quite good at stopping some attacks. But crime never sleeps, and cybercriminals have been creatively seeking new ways to infiltrate our systems. Contact forms and cybercrime A company called Abnormal Security has found that a nasty piece of malware called BazarBackdoor is being… . . . read more

ADVICE FROM THE WHITE HOUSE

Is your law office vulnerable to Russian cyberattacks?

The White House is urging businesses to review and improve cybersecurity because of a heightened risk of cyber attacks from Russia. A statement from the Biden-Harris Administration advises businesses to take the following steps: Mandate the use of multi-factor authentication on your systems to make it harder for attackers to get onto your system; Deploy modern security tools on your computers and devices to continuously look for and mitigate threats; Check with your cybersecurity professionals to make sure that your systems are patched and protected against all known vulnerabilities, and change passwords across your networks so that previously stolen credentials are useless to malicious actors; Back up your data and ensure you have offline backups beyond the reach of malicious actors; Run exercises and drill your emergency plans so that… . . . read more

INFORMATION SECURITY

Protect your data as Russia-Ukraine war increases cybersecurity risk

By Ron Slyker As part of the ongoing Russia-Ukraine conflict, Russian cyberattacks have primarily targeted Ukrainian government and bank systems, but the attacks may spread to countries outside of Ukraine soon. The Cybersecurity and Infrastructure Agency (CISA) and the FBI have warned organizations to increase protection as a precaution in case these attacks begin to affect the United States. Experts have reported known Russian cyber groups gathering information on U.S. infrastructure like electric and gas sites. While the FBI and CISA have received no warnings of direct threats to any Western countries, it is best to act now to protect your information. What can you do to protect your business from global conflict? Take action. Experts believe that any Russian cyberattacks would be disruptive, rather than intended to steal data, but… . . . read more

CYBERSECURITY

Are former staffers still accessing your firm’s accounts?

With the Great Resignation, workers are leaving in record numbers and the cybersecurity threat to employers is real. In a recent study, phishing-resistant multi-factor authentication (MFA) provider Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found a vast majority of employees (83%) admitted to maintaining continued access to accounts from a previous employer. The cybersecurity threat this poses is coupled with the fact that more than half of these employees (56%) said they had used this continued digital access with the specific intent of harming their former employer. Ongoing access to sensitive information paired with frequently malicious intent spelled disaster for these former employers. When the survey turned to focus specifically on responses from managers and business leaders, 74% admitted their… . . . read more

COMPLIANCE

How to give your analog workplace harassment policy a digital makeover

One of the only nice things about the pandemic is the relief it’s provided from workplace harassment. After all, employees are far less vulnerable to workplace harassment when they work from home. Right? Absolutely wrong!!! Since the pandemic began: More than 4 in 10 U.S. workers (41 percent) reported that they’ve been subjected to some form of digital harassment (Pew Research); Nearly half (45 percent) of women experiencing sexual harassment say it happened remotely (Rights of Women, UK and Wales (“ROW”)); 23 percent of women reporting that they’ve been harassed say the problem has actually gotten worse since they began working from home (ROW); and More than 7 in 10 (73 percent) of victims say they don’t think their employer is doing enough to protect them from remote harassment (ROW)…. . . . read more

CYBERSECURITY

5 unintended ways companies compromise their network security

By Ron Slyker Solid organization security is a considerable necessity in today’s world—that’s not going to come as a surprise to anyone. Nonetheless, making and keeping an impenetrable organization is something that stays a slippery objective for some enterprises. Organizations of all sizes are continuously struggling with the battle of guaranteeing that each potential security gap is sealed securely. Most organizations are coming up short with attempting to guard their organizations, making them defenseless against data theft and malicious network invasion. To feature exactly how genuine this issue is we will diagram five of the main manners by which endeavors are accidentally bargaining their organization security, and exactly how they can fix these oversights. Sole reliance on VPNs as a security bandage Virtual Private Networks (VPNs) assume a significant part… . . . read more

CYBERSECURITY

5 tips to keep your cloud data secure

By Ron Slyker bio The trick to avoiding a cloud data security breach is to pay close attention to your cloud applications and user behavior. While analyzing the software and looking at user behaviors takes time, the benefits of reducing cloud and data security breaches make it worthwhile. Examine user activities It is vital to know not only which apps you use, but also how they use your data. Determine which apps the employees use to share content and whether they have a sharing feature. Knowing who is sharing what and with whom will assist you in deciding the right policies to use. 2. Users should be moved to high-quality apps Cloud-switching is fairly inexpensive, if you find an application that would work better for you, you can always migrate… . . . read more

PRODUCTIVITY

8 ways to cut the chaos on Zoom

By Lynne Curry bio Question: Our department’s weekly Zoom meetings are a train wreck. One coworker’s kids pop their heads in front of the screen and wave “hello.” Another guy’s kids are on the other side of the table from where he sits, and they interrupt him when he’s talking to argue with him. I’m obligated to attend these meetings. Any advice would be appreciated. Answer: Every train needs a conductor; yours appears to be asleep at the wheel. Zoom meetings go off the rails when those who attend forget that while they’re at home, they’re also at work. If you ask every attendee to observe eight guidelines, it might get your meetings back on track. Professionalism: Please demonstrate professionalism as well as comfort in your attire. Use your video… . . . read more

Telecommuting

Cybersecurity risks rise when law office staff works from home

By Ron Slyker The number of people who work from home has slowly increased from year to year. In 2020 that number skyrocketed as companies including law offices were forced to implement telecommuting policies. Making the transition from traditional office to home office has brought some challenges, but arguably the most challenging aspect of the process has been maintaining cybersecurity. Now in 2021 the need for remote worker security is more important than ever. Keep yourself safe with network security assessments Employees who work from home are more susceptible to cyber threats than employees who work in the office. The reason is businesses can afford enterprise-level cybersecurity services. The average home not only does not have access to this level of security but may also lack basic security measures. When working from… . . . read more


(-0)