Today’s legal clients demand high-quality service from their attorneys, particularly regarding technology. Using the latest legal technology typically makes an attorney more efficient, accurate and productive, resulting in happier clients and more time to do what they are trained to do: practice law.
Read More


A siege mentality has long pervaded attempts to secure IT networks, encrypt data, and control access to a law firm’s sensitive information. That thinking tracked along medieval concepts of securing a fortress using thicker walls, stronger gates, and deeper moats. If you remained inside the walls, then you were protected, but if you ventured out then risks spiked, and all protection was lost.
Read MoreAll organizations – particularly those that outsource crucial business operations to third-party technology businesses and SaaS companies – must ensure that their data is handled properly, protecting customers from data theft, extortion, and malware attacks. Service Organization Control 2 (SOC 2) provides a framework to help stakeholders ensure that vendors protect the interests of the company they serve and the personal data of vulnerable clients.
Read MoreWith cybersecurity threats on the rise, it is imperative that firms proactively improve internal and external security protocols. Keeping confidential information and sensitive client data secure means extending such protocols to each software vendor.
Read MoreWith so much technology at our fingertips, IT professionals always have some sort of new technological advancement to tackle. Any time you undertake a project that involves your computers, it is a good idea to have your IT team involved.
Read MoreIt’s becoming more and more difficult to stay current with all the cybersecurity threats that individuals and businesses face. The “bad guys” are focusing not only on accessing data, but they are continually sending emails, texts and phone calls. They are targeting smaller business entities with the assumption that these businesses do not have the appropriate protection in place. As more people continue to work remotely, it is becoming increasingly important that everyone understand why security is critical and what is at risk. We all understand the importance of locking the doors to our homes and apartments as well as our automobiles. Cybersecurity is just as important, and in many cases, cyberattacks can be more detrimental than experiencing a home or auto being vandalized. Let’s review some of these cyber threats and ways to protect your firm from them.
Read MoreOur first discussion about disasters covered types of disasters and some basics needed to properly address a disruption in normal activities, including how to build a robust team. We subsequently outlined how to make use of staging areas, alternative facilities, and working from home in the second article.
Read MoreOur first discussion about disasters addressed several types of disasters and some basics needed to properly address disruption in normal activities. Please reference part one to learn more about disaster types and how to build a robust team.
Read MoreA work-from-home policy presents many benefits and drawbacks for a modern law firm. With a virtual law office, your firm will save on monthly rent costs and is likely to experience less employee turnover. However, remotely participating in meetings with clients and employees can be challenging when employees must rely on technology alone for critical communication. Luckily, there are affordable technologies available that will alleviate some of these challenges.
Read More