); Press "Enter" to skip to content

Posts published by “Alisanne Steele”

7 Characteristics of a Successful Backup Strategy

Alisanne Steele 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

Why and How Law Firms Should Safeguard Their Clients’ Data

Alisanne Steele 0

TheSoftwareConsultant | Thursday, September 13, 2018 Feature specially written for blog.thesoftwareconsultant.com Feature by: Jean Brandrick Last July, personal security website ASecureLife ranked Nevada as the riskiest state for security theft and it’s not hard to see why. Nevada is known for gambling and spending extreme amounts of money – two very attractive activities for identity thieves and hackers.…

Simple Two-Factor Security That Can Protect Your Data From Compromise

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Thursday, July 26, 2018 Target, Twitter, Time-hop (the list goes on and on) have had data breaches exposing multi-millions of user’s personal and financial information to bad actors.  However, this personal data is just one part of the puzzle if your accounts are protected by additional layers of security.  Two-Factor Authentication could protect…

AlphaDrive for Clio – Seamless (and Painless) Document Automation

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | July 16, 2018 So many cloud-based case & matter management systems have a common “Weakest Feature”, the document automation process.  Being cloud-based, the edit-upload-download-edit-upload process for reviewing and editing documents is just plain clumsy in many hosted solutions. AlphaDrive for Clio changes that! With AlphaDrive added to your Clio solution,…

Timeslips 2019 – 7 New Features are Worth the Upgrade

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, July 8, 2018 Sage has put together a feature rich upgrade for Timeslips users.  While I usually recommend that users upgrade every-other release (while maintaining support availability), this version is truly worth the cost and effort of upgrading.  In addition to some long-awaited fixes, the following are a listing of some of…

Seven Characteristics of a Successful Backup Strategy

Alisanne Steele 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

7 Signs it’s Time to Re-Invest in Matter Management

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 14, 2018 Upgrading a practice management system is a big decision for any law firm. When your existing solutions have often been adapted to over many years to fit working practices to the software workflow, staff feel comfortable using them, and there is often the fear that change will disrupt day…

How to protect yourself from Phishing!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

How to Craft a Strong Password and Keep your Data Safe!!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Tuesday, April 3, 2018 There is a ton of information out there about how to create that perfect password.  As long as you follow the rules, your password should be strong and un-crackable.  Or at the very least, your password should be strong enough to outlast a few rounds of brute force attacks…