• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Information security

How to protect your data against costly and destructive cyber attack

February 20, 2015

Who is hacking into law firms? Are you at risk? How do security breaches happen? How to protect your data The downside of smartphones Planning for a breach   At the law offices of Florrick, Agos & Lockhart, partner Diane Lockhart opens an email from a colleague and clicks on a link. As soon as she does, all the computers in the office go dark and a message pops up on … [Read more...] about How to protect your data against costly and destructive cyber attack

How to Protect Your Law Practice against Costly & Destructive Cyber Attack

December 12, 2014

Get the presentation materials here Join our presenters Sharon D. Nelson, Esq., President, Sensei Enterprises, Inc. and John W. Simek, Vice President, Sensei Enterprises, Inc. and our moderator Catherine Jones, Editor of Law Office Manager as they discuss the rise in cyber crime, what it is, and how it is affecting your law firm. Here is just a sample of what they … [Read more...] about How to Protect Your Law Practice against Costly & Destructive Cyber Attack

Leaky password managers on Android

December 5, 2014

By John Simek  bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android

The opportunities, concerns, and challenges related to adopting cloud services

November 7, 2014

According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services

Two quick tips from a cybersecurity expert

November 7, 2014

By John W. Simek  bio 1. You are the product: default settings to “steal” your privacy data It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button. That seems to be what … [Read more...] about Two quick tips from a cybersecurity expert

Model Tool: Client privacy policy

October 31, 2014

Why you need this policy: As with any other corporate website, law office websites collect and use personal information of site visitors, including "personally identifiable" information, i.e., names and other information that can be traced back to a specific individual. Such use and collection of personal information is subject to requirements under privacy laws. How this … [Read more...] about Model Tool: Client privacy policy

How secure is your content in cyber space?

October 20, 2014

www.Hackmageddon.com has released its timeline of the most notable cyber security breaches that occurred in the first half of October 2014. According to the timeline, in just 15 days, there were 46 attacks, with a wide range of targets and objectives. If you're concerned about how to protect your law practice against costly and destructive cyber attacks, register now for our … [Read more...] about How secure is your content in cyber space?

Model Policy: Employee computer use and social networking

October 3, 2014

Why you need this policy: The law governing your right to discipline employees for the things they say on blogs and social networks is still in its infancy stages. But even from the early cases, it has become clear that online conversations are not simply private matters. There's a big difference between bad mouthing a company, supervisor or colleague to a friend in a bar over … [Read more...] about Model Policy: Employee computer use and social networking

Model Tool: Privacy Risk Assessment

August 29, 2014

Why you need this assessment: Information collected about individual job applicants is considered personal information subject to privacy laws, regardless of whether the information is publicly available. You need to consider these privacy risks you face before using social media sites like Facebook to gather personal information about job applicants. How this assessment helps … [Read more...] about Model Tool: Privacy Risk Assessment

Model Tool: Pre-Employment Screening Notification

August 29, 2014

Why you need this notification: Collecting information about job applicants from social media websites like Facebook can get you into legal hot water. That's because the information you collect may be considered protected, personal information to the extent applicants can show they had a reasonable expectation of privacy in the material. How this notification helps you: It's … [Read more...] about Model Tool: Pre-Employment Screening Notification

« Previous Page
Next Page »

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Offering AI Upskilling as a Job Benefit: A Smart Move for Office Managers

How to Create a Calm, Focused Environment in a Small Office

Do I Fire A Staffer Who Doesn’t Deserve It?

Why Every Office Manager Should Create Standard Operating Procedures (SOPs)

Reconnecting with Purpose: How to Invite Someone from the Past into Your Career Network

Your Career

Do I Fire A Staffer Who Doesn’t Deserve It?

Reconnecting with Purpose: How to Invite Someone from the Past into Your Career Network

How I Outsmart My To-Do List (with a Little Help from Tech)

What to Do If You’re the One Who’s Always Late

Is AI Pushing You Into a Career Change?

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315