Does your firm use document automation tools? If not, you’re not alone. According to a survey conducted in 2013 by the International Legal Technology Association, a whopping 62% of law firms surveyed reported not using a document automation system. But when you think about how much time your team spends assembling variations of the same documents every day, automating the … [Read more...] about How document automation can save you thousands
Information security
Get your firm ready for any kind of disaster at free National Preparedness Month webinar series
Are the members of your firm prepared to communicate quickly and effectively with each other when a crisis hits? Did you know that nearly 70 percent of all U.S. businesses will lose power at one point in the next 12 months? Do you have a plan in place to keep your operations running? How will you rebuild your business if your employees are unable to report to work after a major … [Read more...] about Get your firm ready for any kind of disaster at free National Preparedness Month webinar series
Are you changing your security strategy?
The growing proliferation and sophistication of hackers, combined with greater reliance on interconnected applications, devices and systems, has created a security environment that's challenging for even the best prepared organizations, according to new research recently released by CompTIA, the IT industry association. "It's not that businesses need to be convinced that … [Read more...] about Are you changing your security strategy?
How to protect your data against costly and destructive cyber attack
Who is hacking into law firms? Are you at risk? How do security breaches happen? How to protect your data The downside of smartphones Planning for a breach At the law offices of Florrick, Agos & Lockhart, partner Diane Lockhart opens an email from a colleague and clicks on a link. As soon as she does, all the computers in the office go dark and a message pops up on … [Read more...] about How to protect your data against costly and destructive cyber attack
How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Get the presentation materials here Join our presenters Sharon D. Nelson, Esq., President, Sensei Enterprises, Inc. and John W. Simek, Vice President, Sensei Enterprises, Inc. and our moderator Catherine Jones, Editor of Law Office Manager as they discuss the rise in cyber crime, what it is, and how it is affecting your law firm. Here is just a sample of what they … [Read more...] about How to Protect Your Law Practice against Costly & Destructive Cyber Attack
Leaky password managers on Android
By John Simek bio Ars technica recently posted a very scary bit of information. In early 2013, security researchers discovered that some password managers used on Android devices can actually be accessed by other installed apps, even those with extremely low-level privileges. Almost two years later, apparently there is still a problem. The issue seems to revolve around the … [Read more...] about Leaky password managers on Android
The opportunities, concerns, and challenges related to adopting cloud services
According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about security, compliance, or management of the services? This infographic created by NJIT’s Online Masters in Computer Science outlines the scale of cloud services and the … [Read more...] about The opportunities, concerns, and challenges related to adopting cloud services
Two quick tips from a cybersecurity expert
By John W. Simek bio 1. You are the product: default settings to “steal” your privacy data It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button. That seems to be what … [Read more...] about Two quick tips from a cybersecurity expert
Model Tool: Client privacy policy
Why you need this policy: As with any other corporate website, law office websites collect and use personal information of site visitors, including "personally identifiable" information, i.e., names and other information that can be traced back to a specific individual. Such use and collection of personal information is subject to requirements under privacy laws. How this … [Read more...] about Model Tool: Client privacy policy
How secure is your content in cyber space?
www.Hackmageddon.com has released its timeline of the most notable cyber security breaches that occurred in the first half of October 2014. According to the timeline, in just 15 days, there were 46 attacks, with a wide range of targets and objectives. If you're concerned about how to protect your law practice against costly and destructive cyber attacks, register now for our … [Read more...] about How secure is your content in cyber space?