Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the gd-system-plugin domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114

Deprecated: Array and string offset access syntax with curly braces is deprecated in /var/www/wp-content/plugins/gravityforms/common.php on line 4151
Alisanne Steele – Page 2 – Alisanne Steele ); Press "Enter" to skip to content

Posts published by “Alisanne Steele”

How to protect yourself from Phishing!

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

Does your firm BYOD?

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Monday, March 19, 2018 Does your firm BYOD? Bring your own device (BYOD) refers to the policy of permitting employees to bring personally owned mobile devices into the workplace, and to allow them to connect those devices to company assets, information, and/or applications. Mobile devices and your firm’s data: Whether you…

GUIDE TO BEST BILLING PRACTICES

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Friday, March 9, 2018 The old adage is true, ‘time is money’.  Save time and increase revenue with these time & billing best practices  Record your time, record your time, record your time! Your work day is most likely jam packed, but recording billable time during or immediately following a…

Top Management Reports Every Law Firm Should Run

Alisanne Steele 3

Alisanne Steele | TheSoftwareConsultant | Monday, March 5, 2018 A recent survey of law firms in the U.S. found that over 70% of those firms do not use their billing or management software to identify trends, key clients, slow paying clients, or timekeeper contribution and profitability. The following reports are available in most billing programs available to the…

BYOD (Bring Your Own Device) Policies & Security for the Law Firm – Lunch & Learn

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…

BYOD – Do you have a Written Policy?

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 28, 2018 Bring your own device (BYOD) policies are becoming a more frequent topic of discussion when reviewing current IT & Documentation needs with our clients. Staff are bringing their devices to the workplace more and more frequently, and connecting (When possible) to your environments. Why not work with that…

Where have all the Boxes Gone?

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Monday, February 26, 2018 Timeslips is no longer selling Non-Subscription (One Time Purchase) licenses directly to End-Users. They have joined many other Legal-Focused Software Vendors (Abacus Law, Amicus Atttorney, etc.) and jumped on the Subscription bandwagon. If you have been thinking about an upgrade, then Timeslips 2018 should be on your radar…

3 ways hackers use your employees to their advantage

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 22, 2018 Cyber criminals don’t just slip into your network with the help of some serious hacking skills. In fact, there’s a much simpler way to do that… through your employees. Social engineering is a tactic hackers are using more and more frequently to infiltrate systems. It involves a variety…