22February, 2017

How to Vet Cloud Technology Providers

Deciding to use cloud technology in your law practice is only the first step. It’s a great first step – but you still need to vet those cloud technology providers!
If you’ve ever heard me speak, you’ll know that I advocate for the use of cloud technology in today’s law firms. There are at least three rock […]

6September, 2016

How to Avoid a Data Breach: Best Practices for the Small Law Firm

We’ll be at Social Law Library on December 8th with practical guidance on data security for small law firms.
If you’re wondering exactly what your small law firm needs to do to protect against threats to your data, this program is for you. Bring your specific security needs, and work with experts who can give you […]

12August, 2016

Entity Selection for Law Practice Startups

Entity selection is one of your first, foundational decisions as a law practice startup, and you want to get it right.
Entity selection is always one of the first considerations in starting a law practice, and it’s worth your time to think it through. There are a number of considerations to weigh when determining whether and what […]

28July, 2016

Do You Need Legal Malpractice Insurance in Massachusetts?

We’re starting off a series on Startup Questions with one of the most common inquiries we hear: legal malpractice insurance requirements for Massachusetts attorneys.
Massachusetts does not require legal malpractice insurance for attorneys. However, it is highly recommended to mitigate the cost of a malpractice insurance claim.

There are a number of places from which attorneys can acquire malpractice […]

13May, 2016

Privacy Breaches, Cybercrimes and the Practice of Law [Guest Post]

You may have noticed that we write a lot about data security at this blog.  That’s not by accident: lawyers have a seemingly ever-increasing number of professional responsibilities respecting the confidentiality of the client information they maintain; simultaneously, they’re opposed in those efforts by new, and more complex threats related to data breach.  But, that’s […]

22April, 2016

7 Tactics for Building Strong Passwords [Guest Post]

It’s a basic tenet of personal and professional data security: You need strong passwords, if you want to better secure your private information.  Even as that is a well-known proposition, the most common passwords are easily cracked.  Part of the challenge, especially for businesses, comes in establishing effective password regimes.  The following guest blog post […]

12February, 2016

ABA TECHSHOW: 2 Discounts + 2 Presentations by Heidi

Early Bird registration for this year’s ABA TECHSHOW ends in THREE DAYS. You can add our Discount Code (EP1620) to the early rates for additional savings over the standard rate.

This year, the conference will run from March 16 through 19 at the Hilton Chicago.

ABA TECHSHOW has 30 years of experience bringing lawyers and technology […]

6January, 2016

Should Old Acquaintance Be Forgot? The Best of the Guests

Every year, we receive and publish high-quality guest blog posts on a variety of subjects.  As the New Year turns over, our annual tradition has been to collect those guest blog posts into one omnibus post, thereby republishing them.  Not wanting 2015 to feel left out, we’ve just done that for it, below.

Thanks to all […]

5January, 2016

The Posts of Christmas Past: Our Best of 2015

It’s that time of year again . . . when we select our very best blog posts from the preceding year.  Amazingly enough, this will be our 7th annual version of this post.  That’s a lot of blog posts to have chosen from; but, we try to exercise our very best judgment, each and every year.  Just forty-three years on, […]

11December, 2015

Who Goes There? The Assumption of an Inverse Relationship between Service and Security

Lawyers have been reticent to apply stricter security models to their practices in part because they assume that, as security features increase, convenience decreases, for staff and for clients.  A typical example of this line of thinking relates to email encryption: Attorneys realize the importance of locking down sensitive information; but, when they are confronted […]