Security


Nothing But the Ruth!

Attorney Safety: Interview with Stephen Kelson

By | Aug.17.17 | 1 Comment

Earlier this year, I shared statistics about threats of violence made against attorneys. Stephen Kelson, a shareholder at Christensen & Jensen PC in Salt Lake City, focuses on commercial litigation, personal injury and mediation, but …Continue reading »


Email, Text, Voice and Video

Using Encryption for Secure Client Communication

By | Jul.27.17 | No Comments

Secure client communication is a major concern for lawyers. Encryption is your best option for protecting confidential and sensitive information you exchange by email, text, voice and video calls with your clients. Email Encryption ABA Formal Opinion …Continue reading »


Zola Suite Product Spotlight

Zola and RPost Empower Lawyers with Certified E-Delivery Proof and Encryption

By | Apr.13.17 | 1 Comment

Zola Suite Launches RPost’s Services in its Law Practice Management Platform Zola Suite has announced that email open tracking, certified e-delivery proof, email encryption, and e-signatures are now built into its law practice management email, matter, and time …Continue reading »


Friday Tech Tips

Smart Law Offices and Connected Devices

By | Mar.03.17 | No Comments

It starts with a simple request to your iPhone (“Siri, add an appointment to my calendar”) or a command to your new Amazon Echo (“Alexa, add toner to my shopping cart”). Before you know it, the …Continue reading »


Futures Week

Will Law Firm Data Be Any Safer in 2026?

By | Sep.29.16 | 1 Comment

As always, the College of Law Practice Management’s 2016 Futures Conference featured wonderful speakers — and the theme this year, “What will Law Look Like in 2026?”, brought out some provocative ideas. Today, Sharon Nelson …Continue reading »


The Future of Law

What Will Law Look Like in 2026?

By | Sep.25.16 | No Comments

The 2016 Futures Conference featured a crowd of wonderful speakers with provocative ideas. The theme, “What Will Law Look Like in 2026?” brought out some deeply interesting ideas. We asked four conference speakers to summarize their presentations: The …Continue reading »


Get It Done!

Your Note-Taking and To-Do Apps: Are They Secure?

By | Aug.15.16 | 1 Comment

As a result of the flood of innovation in note-taking and task-centric apps since Evernote’s inception, there’s a large concern for lawyers in storing attorney-client and privileged information. While I know a lot of lawyers …Continue reading »


Security

How Law Firms Can Recognize and Avoid Social Engineering Scams

By | Aug.03.16 | 1 Comment

When we think of information security breaches, we often blame weaknesses in technology. But in many of the most damaging security breaches, trusted law firm employees and partners are the weakest link. An old email trick has …Continue reading »


Cybersecurity

Protect Your Law Firm from Ransomware Attacks

By | May.11.16 | No Comments

It’s 6 p.m. You are about to put the final touches on a brief that is due tomorrow when a message pops up on your laptop. It informs you that a third party has gained …Continue reading »


Data Leak

Second Round of Panama Papers Released

By | May.10.16 | No Comments

Yesterday, at 2 p.m. Eastern, the International Consortium of Investigative Journalists (ICIJ) released a second batch of the “Panama Papers” in a live and searchable (but stripped-down) database of more than 200,000 entities. Many of the …Continue reading »