Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Daily eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!
EMAIL ADDRESS



Upgrade to Premium Membership NOW for Just $90!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
PRODUCTIVITY

4 ways to use voice technology to save time

The expectations from today’s business professionals continue to increase with an ever-changing modern world. Heaps of documentation and document creation needs add on to often already heavy workloads. Yet, there is limited to no help managing administrative tasks. As a busy office manager, there are always work processes to be improved, time to gain, and more efficient ways to bring to screen and paper what needs to be documented. When handling our day-to-day work, we often don’t think of how we could work more efficiently and are caught up in outdated processes. We try to create our documents the most straightforward way we know—by typing them ourselves. But what if you could make a small change that could be a huge time saver? As suggested by Phillips Dictation SpeechLive, here… . . . read more

TECHNOLOGY

A primer on document management systems

Are you wondering how to modernize your office’s system of managing documents?  A document management system, or DMS, refers to the tools and processes your organization uses to store and manage documents. A modern DMS will often provide robust search capabilities, metadata tagging, access controls, and increased security processes to protect files. NetDocument, a cloud content management platform where legal professionals do work, offers this primer document management systems: In the past, document management meant a combination of filing cabinets, boxes, shelves, folders, binders, scanners, thousands upon thousands of printed pages, and designated square footage in the office to hold it all. Document management has evolved to align with today’s digital workplace by storing electronic  files and documents either in an on-premises or cloud-based DMS. These tools bring with them… . . . read more

CYBERSECURITY

How to stay vigilant without hiring a surprise attack ninja

Remember the Pink Panther movies? Peter Sellers’ character, Inspector Clouseau, hired “Cato” to randomly attack him. He thought unexpected ninja attacks would keep him every vigilant. While the over the top comedy is ridiculous, it does remind me of how to approach cybersecurity. You do not need to hire someone with a kendo stick to beat your staff into compliance, but frequent “reminders” do promote vigilance. This comparison comes from Mike Sacopulos, founder and CEO of the Medical Risk Institute. He said most professional practices provide cybersecurity training when an employee is first hired, and annually after that. While certainly this method will check the box for “security training” it is highly ineffective for maintaining good cybersecurity habits. Cybersecurity training is not a “once you learn it, you know how… . . . read more

DATA SECURITY

Is your contact form providing a back door for cybercriminals?

By Doug Striker As automated email filtering gets better at screening for phishing attempts, criminals are responding by looking for attack techniques that evade those tools. Believe or not, their newest tactic is to fill out online contact forms and then use the response process to sneak malware into your system. By now, we are all familiar with email phishing. Most law firms today are conducting (or should be conducting) security awareness training across their organizations. And, as mentioned above, email filtering technologies have advanced and are quite good at stopping some attacks. But crime never sleeps, and cybercriminals have been creatively seeking new ways to infiltrate our systems. Contact forms and cybercrime A company called Abnormal Security has found that a nasty piece of malware called BazarBackdoor is being… . . . read more

ADVICE FROM THE WHITE HOUSE

Is your law office vulnerable to Russian cyberattacks?

The White House is urging businesses to review and improve cybersecurity because of a heightened risk of cyber attacks from Russia. A statement from the Biden-Harris Administration advises businesses to take the following steps: Mandate the use of multi-factor authentication on your systems to make it harder for attackers to get onto your system; Deploy modern security tools on your computers and devices to continuously look for and mitigate threats; Check with your cybersecurity professionals to make sure that your systems are patched and protected against all known vulnerabilities, and change passwords across your networks so that previously stolen credentials are useless to malicious actors; Back up your data and ensure you have offline backups beyond the reach of malicious actors; Run exercises and drill your emergency plans so that… . . . read more

INFORMATION SECURITY

Protect your data as Russia-Ukraine war increases cybersecurity risk

By Ron Slyker As part of the ongoing Russia-Ukraine conflict, Russian cyberattacks have primarily targeted Ukrainian government and bank systems, but the attacks may spread to countries outside of Ukraine soon. The Cybersecurity and Infrastructure Agency (CISA) and the FBI have warned organizations to increase protection as a precaution in case these attacks begin to affect the United States. Experts have reported known Russian cyber groups gathering information on U.S. infrastructure like electric and gas sites. While the FBI and CISA have received no warnings of direct threats to any Western countries, it is best to act now to protect your information. What can you do to protect your business from global conflict? Take action. Experts believe that any Russian cyberattacks would be disruptive, rather than intended to steal data, but… . . . read more

CYBERSECURITY

Are former staffers still accessing your firm’s accounts?

With the Great Resignation, workers are leaving in record numbers and the cybersecurity threat to employers is real. In a recent study, phishing-resistant multi-factor authentication (MFA) provider Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found a vast majority of employees (83%) admitted to maintaining continued access to accounts from a previous employer. The cybersecurity threat this poses is coupled with the fact that more than half of these employees (56%) said they had used this continued digital access with the specific intent of harming their former employer. Ongoing access to sensitive information paired with frequently malicious intent spelled disaster for these former employers. When the survey turned to focus specifically on responses from managers and business leaders, 74% admitted their… . . . read more

TELEWORK

What law firms have learned about working remotely

When the pandemic first hit, the professional world shifted to remote working in an instant, but many people viewed the transition as temporary. Two years later, it’s clear that working from home is here to stay. The more time we’ve spent working remotely, the more we’ve learned—and like everything else in life, our process continues to evolve. According to Cosmolex, a company which provides cloud-based management software to law practices, this is what we learned over the last year: Communication is key Working remotely means fewer opportunities for casual checking in with team members—which puts more pressure on maintaining clear communication. Every law office will have its own preferences, but it’s a good idea to have some kind of platform for quick, casual messaging. Establishing office-wide use of a designated… . . . read more

TOOL

Model Code of Conduct for Virtual Meetings

Far from eliminating workplace harassment, telecommuting has only caused it to morph into digital forms. As a result, law offices and other employers need to tweak their harassment policies to deal with the new face of harassment. The virtual meeting, in particular, has become the digital age version of the holiday office party where employees feel emboldened to do and say things they wouldn’t dream of doing and saying to co-workers in-person. How do you crack down on this behavior? The starting point is to implement a Code of Conduct Virtual Meetings. Here’s a template you can adapt.

COMPLIANCE

How to give your analog workplace harassment policy a digital makeover

One of the only nice things about the pandemic is the relief it’s provided from workplace harassment. After all, employees are far less vulnerable to workplace harassment when they work from home. Right? Absolutely wrong!!! Since the pandemic began: More than 4 in 10 U.S. workers (41 percent) reported that they’ve been subjected to some form of digital harassment (Pew Research); Nearly half (45 percent) of women experiencing sexual harassment say it happened remotely (Rights of Women, UK and Wales (“ROW”)); 23 percent of women reporting that they’ve been harassed say the problem has actually gotten worse since they began working from home (ROW); and More than 7 in 10 (73 percent) of victims say they don’t think their employer is doing enough to protect them from remote harassment (ROW)…. . . . read more


(-0)