Mid-Law Insights

Strategies to Grow Mid-size Law Firms

Your Greatest Cyber Threat Is Down The Hall

WHY INTERNAL PEOPLE ARE YOUR GREATEST RISK

Cyber hacks make big headline news. For example, the Democratic National Committee may have been hacked by “patriotic” Russians who ostensibly sought to affect the outcomes of the last U.S. election. Watching the news, it’s understandable why you might believe your greatest security threat is from an offshore organization seeking to hack into your firm.  Or you might feel that your firm is secure because you have firewalls and other strong external perimeter defense protections.

But in my experience, an external attack is far less likely to cause a breach than internal people.  As the CIO of LOGICFORCE, I have come to believe that your most prevalent cyber security threats are internal, not external. Here is my best advice to you about how to identify and manage these threats so you can avoid the very negative consequences that follow cyber breaches.

Your Greatest Cyber Threat Is Down The Hall
Read More...

Will Your Evidence Stand Up In Court?

THE VALUE OF DEFENSIBLE PROTOCOLS

Many small to mid-sized law firms today use eDiscovery Collection practices, such as relying on in-house resources and tools, that they believe to be faster and less burdensome than other options.  It’s the path of least resistance. But is this wise? These practices can put them at reputational and financial risk. 

If your firm is doing this, you are probably incurring far more risk than you realize.  I want to make sure you understand the risks you might be taking and are aware of options that can produce the results you desire without the dangers.  Here are my thoughts about how to produce evidence that will stand up in court because it was collected via defensible protocols.

Will Your Evidence Stand Up In Court?
Read More...

5 Ways Moore’s Law Is Putting Your Law Firm At Risk

WHY YOU NEED A TRUSTED TECHNOLOGY ADVISOR

Moore’s law holds that the compute power of CPUs (a computer brain) will double about every 18 months.  While this may not be perfectly accurate, there is no doubting the pace of technological change.  You probably have more technology options than ever before.  So how do you decide what makes sense for your law firm? 

Where should you be investing?  What technologies are “must haves” and what should you avoid?  More importantly – who is your trusted advisor to ensure you don’t fall behind, get the advantages and avoid the pitfalls of disruptive technology change?

As the President of LOGICFORCE, I get to witness the strategic and non-strategic choices of hundreds of law firms, when it comes to legal technology.  I think this gives me a very unique perspective on the dynamism of our market.  Here are the top 5 ways I see rapid technological advancements putting mid-size law firms at-risk and a solution I recommend to mitigate those risks.

5 Ways Moore’s Law Is Putting Your Law Firm At Risk
Read More...

Technology Obsolescence Kills Law Firm Productivity

FORTUNATELY, THERE’S A MUCH BETTER WAY

Law firms routinely come to us with a specific pain point: an outdated document management system, an aging server, a cyber security issue or a myriad of other challenges.  They eagerly await the resolution of the problem so they can get back to focusing on work.  But I have a concern.

In nearly every situation where we’ve encountered outdated technology, a single fix will not actually fix the problem.  Why?  Because technology is an ecosystem.  Like all ecosystems, changes in one area impact other areas.  An improved document management system might require a new server which might require new network systems which will definitely impact cyber security.  How do you afford it all?  How do you anticipate an expensive upgrade chain reaction? 

It appears to me that most small-to-mid-sized law firms have accepted, as a reality of modern business, that they cannot keep their entire technology ecosystem upgraded and on the cutting-edge.   I do not accept this premise.  To realize break-throughs in productivity and profits, you need a better approach to managing technology obsolescence.  Here is my advice about how to do this. 

Technology Obsolescence Kills Law Firm Productivity
Read More...

Top 10 Law Firm Cyber Security Threats Right Now

AND WHAT YOU CAN DO TO ADDRESS THESE

Law firms today face more cyber security threats than ever before and the threat landscape is evolving rapidly.  If you don’t understand where you are at risk and what to do about it, it’s nearly impossible to defend your clients’ data and your firm’s reputation.  I want to help you understand where you are at risk right now by sharing my top 10 list of cyber security threats.

As the CIO of LOGICFORCE, I see law firms being subjected to a wide variety of cyber threats.  Any one of these threats might cause irreparable damage to your law firm.  Yet each one of these can also be addressed effectively with the right technologies and right approach.  Here are my top 10 cyber security threats for law firms and what you can do about them. 

Top 10 Law Firm Cyber Security Threats Right Now
Read More...

The True Cost of Unresolved Litigation

IT Is Likely Higher Than You Realize

Cutting edge strategies, laser focused marketing campaigns, smart investments and a talented workforce will not alone ensure a company's success. Every organization is competing for scarce resources and market share in innovative ways unheard of even five years ago. Therefore even the simplest business transaction risks conflict. Understanding, managing and planning for conflict so that it does not become a barrier to growth and prosperity should be of paramount importance to every company.

The True Cost of Unresolved Litigation
Read More...

Looking At The Future From A Cybersecurity Point Of View

Perspectives To Consider

Last September, the 2015 ILTA/InsideLegal Technology Purchasing Survey which was released during ILTACON in Las Vegas stated that security management was the largest challenge facing legal IT departments that took part in the survey. This was the first time in eight years that email management didn’t come in first place in that category. For anyone who’s paid attention to the news headlines this past year, this shift should come as no great surprise. Cybersecurity threats are definitely making the headlines—and can be challenging to tackle head-on.

Looking At The Future From A Cybersecurity Point Of View
Read More...

Large Law Firms Hacked, Don’t Be Next

We Are Here To Help

The Wall Street Journal announced on Tuesday, March 29th 2016, that Cravath Swaine & Moore LLP and a handful of other prominent law firms were recently subject to a data breach in which confidential information regarding clients may have been stolen. This is just one in the proliferation of recent breaches at high profile companies and firms.

Large Law Firms Hacked, Don’t Be Next
Read More...

Cyber Security Considerations for Law Firms

Where You Need to Focus Now

As the news media continues to make us aware of the ever mounting data breaches within our corporations and government agencies one would assume these institutions are the only key targets for state and criminal sponsored hackers. However, data breaches at law firms are occurring at an ever increasing rate yet go primarily unreported. However, 25% of firms did report some type of breach in 2015 up from 10% in 2012.

Cyber Security Considerations for Law Firms
Read More...

A Brief Look at the CyberSecurity Reference Model

A Security-Based Approach to the EDRM

The EDRM (eDiscovery reference model) is one of the most popular conceptual eDiscovery models that legal and technology firms use to make the eDiscovery process as efficient and error-free as possible. It refers to nine stages that are vital to the discovery process: information governance, identification, preservation, collection, processing, review, analysis, production, and presentation. These stages are divided by professional skill sets and largely organized to help legal firms have an easier time calculating the overall needs and costs of a project.

A Brief Look at the CyberSecurity Reference Model
Read More...