); Press "Enter" to skip to content

Posts published in “IT for Law Firms”

IT for Law Firms

The Verizon Mobile Security Index (2018) and why it matters to your firm

Alisanne Steele 0

Alisanne Steele | TheSoftwareConsultant | Thursday, August 2, 2018 Verizon recently released its Mobile Security Index report highlighting the difficulty businesses face in balancing convenience and user experience with security concerns and the reality of today’s internet environment that is filled with risk. The report finds that Companies are sacrificing mobile security for convenience and performance.  Companies that…

Simple Two-Factor Security That Can Protect Your Data From Compromise

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Thursday, July 26, 2018 Target, Twitter, Time-hop (the list goes on and on) have had data breaches exposing multi-millions of user’s personal and financial information to bad actors.  However, this personal data is just one part of the puzzle if your accounts are protected by additional layers of security.  Two-Factor Authentication could protect…

Seven Characteristics of a Successful Backup Strategy

tscblog 0

Seven Characteristics of a Successful Backup Strategy Alisanne Steele | TheSoftwareConsultant | Friday, May 11, 2018 In the late nineties I met a gentleman at a conference who was passing out copies of “The Tao of Backup”* and sharing that “to be enlightened, one must master the seven heads of Backup.” In the handout, and the subsequently published…

7 Signs it’s Time to Re-Invest in Matter Management

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 14, 2018 Upgrading a practice management system is a big decision for any law firm. When your existing solutions have often been adapted to over many years to fit working practices to the software workflow, staff feel comfortable using them, and there is often the fear that change will disrupt day…

How to protect yourself from Phishing!

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…

Does your firm BYOD?

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Monday, March 19, 2018 Does your firm BYOD? Bring your own device (BYOD) refers to the policy of permitting employees to bring personally owned mobile devices into the workplace, and to allow them to connect those devices to company assets, information, and/or applications. Mobile devices and your firm’s data: Whether you…

BYOD (Bring Your Own Device) Policies & Security for the Law Firm – Lunch & Learn

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Saturday, March 3, 2018 The Washoe County Bar Association is Co-Sponsoring the event and all registration will he handled by the WCBAR. Please visit here to register. CLE Credit – BYOD (Bring Your Own Device) Best Practices, Policies, & Security for the Law Firm Whether you provide mobile devices to your staff, allow…

BYOD – Do you have a Written Policy?

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Wednesday, February 28, 2018 Bring your own device (BYOD) policies are becoming a more frequent topic of discussion when reviewing current IT & Documentation needs with our clients. Staff are bringing their devices to the workplace more and more frequently, and connecting (When possible) to your environments. Why not work with that…

Where have all the Boxes Gone?

tscblog 0

Alisanne Steele | TheSoftwareConsultant | Monday, February 26, 2018 Timeslips is no longer selling Non-Subscription (One Time Purchase) licenses directly to End-Users. They have joined many other Legal-Focused Software Vendors (Abacus Law, Amicus Atttorney, etc.) and jumped on the Subscription bandwagon. If you have been thinking about an upgrade, then Timeslips 2018 should be on your radar…