News: LOGICFORCE Featured on Forbes.com

You can read the original Forbes.com article HERE. When you think of the most effective law firms, technology isn’t commonly the first credited component of success. Aside from the need to develop the brand through […]

News: LOGICFORCE Featured on Business Insider

Law firms are preemptively opening Bitcoin wallets to pay ransoms LONDON – Law firms are preemptively opening Bitcoin wallets to pay ransoms in case their data is hacked, according to a cyber-security expert. Opening a […]

Blog: TECHNOLOGY OBSOLESCENCE KILLS LAW FIRM PRODUCTIVITY

FORTUNATELY, THERE’S A MUCH BETTER WAY Law firms routinely come to us with a specific pain point: an outdated document management system, an aging server, a cyber security issue or a myriad of other challenges.  They […]

Blog: TOP 10 LAW FIRM CYBER SECURITY THREATS RIGHT NOW

AND WHAT YOU CAN DO TO ADDRESS THESE Law firms today face more cyber security threats than ever before and the threat landscape is evolving rapidly.  If you don’t understand where you are at risk […]

Blog: THE TRUE COST OF UNRESOLVED LITIGATION

IT IS LIKELY HIGHER THAN YOU REALIZE Cutting edge strategies, laser focused marketing campaigns, smart investments and a talented workforce will not alone ensure a company’s success. Every organization is competing for scarce resources and […]

Blog: LOOKING AT THE FUTURE FROM A CYBERSECURITY POINT OF VIEW

PERSPECTIVES TO CONSIDER Last September, the 2015 ILTA/InsideLegal Technology Purchasing Survey which was released during ILTACON in Las Vegas stated that security management was the largest challenge facing legal IT departments that took part in the survey. This was […]

Blog: LARGE LAW FIRMS HACKED, DON’T BE NEXT

WE ARE HERE TO HELP The Wall Street Journal announced on Tuesday, March 29th 2016, that Cravath Swaine & Moore LLP and a handful of other prominent law firms were recently subject to a data breach in […]

Blog: CYBER SECURITY CONSIDERATIONS FOR LAW FIRMS

WHERE YOU NEED TO FOCUS NOW As the news media continues to make us aware of the ever mounting data breaches within our corporations and government agencies one would assume these institutions are the only […]

Blog: A BRIEF LOOK AT THE CYBERSECURITY REFERENCE MODEL

A SECURITY-BASED APPROACH TO THE EDRM The EDRM (eDiscovery reference model) is one of the most popular conceptual eDiscovery models that legal and technology firms use to make the eDiscovery process as efficient and error-free […]