Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Weekly eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!
EMAIL ADDRESS



Upgrade to Premium Membership NOW for Just $90!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
CYBERSECURITY

5 tips to keep your cloud data secure

By Ron Slyker bio The trick to avoiding a cloud data security breach is to pay close attention to your cloud applications and user behavior. While analyzing the software and looking at user behaviors takes time, the benefits of reducing cloud and data security breaches make it worthwhile. Examine user activities It is vital to know not only which apps you use, but also how they use your data. Determine which apps the employees use to share content and whether they have a sharing feature. Knowing who is sharing what and with whom will assist you in deciding the right policies to use. 2. Users should be moved to high-quality apps Cloud-switching is fairly inexpensive, if you find an application that would work better for you, you can always migrate… . . . read more

PRODUCTIVITY

8 ways to cut the chaos on Zoom

By Lynne Curry bio Question: Our department’s weekly Zoom meetings are a train wreck. One coworker’s kids pop their heads in front of the screen and wave “hello.” Another guy’s kids are on the other side of the table from where he sits, and they interrupt him when he’s talking to argue with him. I’m obligated to attend these meetings. Any advice would be appreciated. Answer: Every train needs a conductor; yours appears to be asleep at the wheel. Zoom meetings go off the rails when those who attend forget that while they’re at home, they’re also at work. If you ask every attendee to observe eight guidelines, it might get your meetings back on track. Professionalism: Please demonstrate professionalism as well as comfort in your attire. Use your video… . . . read more

TECHNOLOGY

Zoom court appearance prep: Check for cat filters

Now that a lawyer has appeared as a kitten in a Zoom court hearing, we can add another item to the list of Zoom hearing best practices: Check the webcam for filters before joining the meeting. Last week an attorney accidentally joined a video conference of a civil forfeiture court hearing while using a webcam filter that made him look like a confused white kitten. “I’m here live. I’m not a cat,” Presidio County Attorney Rod Ponton told Judge Roy Ferguson. “I can see that,” replied Ferguson, whose district covers five counties in West Texas, including the town of Marfa from which Ponton was calling. The short video clip, which was shared online by Ferguson, ends with others coaching the attorney on how to remove the cat filter. The judge… . . . read more

CYBERSECURITY

Disinformation endangers your company, not just democracy

By Doug Striker bio Did you hear about the rumor that COVID-19 was spread by mobile devices using the 5G network? It sounds so insane and far-fetched that no one would believe it, right? I mean, how in the world would a virus travel through a cell phone frequency band, into a cell phone or tablet, and then out of the device into a person’s body? But thanks to social media, fake news sites set up by bad actors, and Average Joes (like you and me) who click that “share” button all too readily, the rumor spread like wildfire, gaining so much traction that people were literally lighting cell phone towers on fire around the world. Why would someone spread such nonsense? And when I say “someone,” I not only… . . . read more

CYBERSECURITY

Employees worse than hackers for putting firms at risk

By Jay Stromberg bio A recent study shows that cybersecurity breaches aren’t caused by issues with your firm’s hardware or software; it’s your people. But, come on, I’ve been saying this for years. Still, it’s nice to have (yet another) study to prove my point. In this case, SolarWinds reported that human error is by far the leading case of security breaches. I mean, seriously, humans are WAY outpacing the machines and other tools in terms of mistakes. HelpNetSecurity.com reported on the study, saying: “Internal user mistakes created the largest percentage of cybersecurity incidents over the past twelve months (80%), followed by exposures caused by poor network system or application security (36%), and external threat actors infiltrating the organization’s network or systems (31%).” Put another way, unwitting employees are actually doing… . . . read more

BLOG

10 ways to spot a phishing email

By Jay Stromberg  bio
There is no such thing as a 100% fool-proof security system that can protect your law firm from phishing emails. And that’s pretty alarming because phishing is now…


. . . read more

SOCIAL MEDIA

Compliance perspective: How to keep an employee from damaging your practice on social media

In the cyber age, protecting your practice from the potential threat posed by employee blogging, tweeting, Instagramming, and other social networking is a…


. . . read more

BLOG

Top 10 phishing phrases of 2018: The KnowBe4 list

By Jay Stromberg  bio
As you may know, Savvy is the largest reseller in the legal industry for KnowBe4 security awareness training. We are…


. . . read more

BUSINESS CONTINUITY

How to ensure your firm can weather a disaster

Many law firms are not well prepared to weather a disaster, whether it’s a physical one such as a flood or fire, or a technological one such as…


. . . read more

BLOG

What is a PDF? (And what ISN’T it?)

By Jay Stromberg  bio
Throughout my career in the legal industry, I’ve spoken with people who have the impression that PDF documents are “secure.” When I ask them…


. . . read more


(-0)