• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Information security

Busting 7 common information security myths

July 21, 2017

Commonly held myths about information security can lead to a potential data breach and ultimately have a big impact on a company's bottom line and reputation. However, these breaches can be avoided when businesses provide their employees with the right training and tools to separate fact from fiction and responsibly manage confidential information. A recent study shows that 23 … [Read more...] about Busting 7 common information security myths

Information Security Checklist for Small Businesses

April 21, 2017

Why you need this checklist: This checklist, created by Sensei Enterprises, Inc., will help you identify what your cybersecurity program must address. How this checklist helps you: This checklist will help you pinpoint your cybersecurity policy's strengths and weaknesses. How to use this checklist: Print off this checklist and review it with members of your cybersecurity … [Read more...] about Information Security Checklist for Small Businesses

Cyberthreats demand your attention and a customized approach

April 21, 2017

The recently released BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyberthreats and to have enterprisewide tactics in place to address intrusions before they happen. At the same time, Dell just released the … [Read more...] about Cyberthreats demand your attention and a customized approach

Keep your firm and yourself cyber safe with some digital spring cleaning

April 7, 2017

The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) are encouraging consumers to get their online lives in good order by conducting a thorough cleanse of their cyber clutter and make "digital spring cleaning" an annual ritual to help protect valuable personal data. A NCSA survey found that preventing identity theft is a top safety concern for Americans, … [Read more...] about Keep your firm and yourself cyber safe with some digital spring cleaning

Why you need to draw the line on unethical behavior

March 17, 2017

By Dr. Steve M. Cohen Some of the most difficult office decisions come down to ethics, and some of the most difficult ethical decisions often seem mundane at first glance. Regardless, I recommend caution because the potential pitfalls are so serious. I have a client who hired someone away from a competitor. The first week on the job, this new hire produced "intelligence" … [Read more...] about Why you need to draw the line on unethical behavior

Data breaches becoming more complex, pervasive, and damaging

February 24, 2017

Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves a lingering, if not lasting imprint on an enterprise, finds Verizon's 2017 Data Breach Digest. As we found in the Verizon 2016 Data Breach Investigations Report (DBIR), the human element is again front … [Read more...] about Data breaches becoming more complex, pervasive, and damaging

January 26 is Data Privacy Day. Learn how to safeguard your data

January 13, 2017

Do your employees how their information is collected, used, and stored by the devices, apps, and websites they use every day? According to a recent Pew Research Center study, 91 percent of American adults "agree" or "strongly agree" that consumers have lost control of how personal information is collected and used by companies. Additionally, 50 percent are worried about the … [Read more...] about January 26 is Data Privacy Day. Learn how to safeguard your data

Gone phishin’: CyLab researchers find our ability to spot phishing emails is far from perfect

October 7, 2016

Each year, tens of millions of phishing emails make it to your inbox, uncaught by your email client's spam filter. Of those, millions more slide past our own judgment and are clicked and opened. A recent study out of Carnegie Mellon's CyLab Security and Privacy Institute has revealed just how likely we are to take the bait. "Despite the fact that people were generally … [Read more...] about Gone phishin’: CyLab researchers find our ability to spot phishing emails is far from perfect

Business-user cyber risk more than doubled during Rio Olympic Games

August 19, 2016

Allot Communications Ltd.—a leading provider of security and monetization solutions that enable service providers to protect and personalize the digital experience—recently released a report on "How the Olympic Games in Rio de Janeiro Put Mobile Business Users at Risk." The analysis found that business-user sports fans' risk from malware and other online threats more than … [Read more...] about Business-user cyber risk more than doubled during Rio Olympic Games

Are you still complacent about mobile security risks?

August 12, 2016

Organizations continue to fall short when it comes to protecting corporate data on mobile apps and devices, according to the Mobile Security and Risk Review, recently released by MobileIron. Mobile threats are on the rise but only 8% of companies are enforcing OS updates and less than 5% are using App Reputation or Mobile Threat Detection software. The second edition of the … [Read more...] about Are you still complacent about mobile security risks?

« Previous Page
Next Page »

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Offering AI Upskilling as a Job Benefit: A Smart Move for Office Managers

How to Create a Calm, Focused Environment in a Small Office

Do I Fire A Staffer Who Doesn’t Deserve It?

Why Every Office Manager Should Create Standard Operating Procedures (SOPs)

Reconnecting with Purpose: How to Invite Someone from the Past into Your Career Network

Your Career

Do I Fire A Staffer Who Doesn’t Deserve It?

Reconnecting with Purpose: How to Invite Someone from the Past into Your Career Network

How I Outsmart My To-Do List (with a Little Help from Tech)

What to Do If You’re the One Who’s Always Late

Is AI Pushing You Into a Career Change?

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315