When using cloud-based programs, data is stored on a remote server to be retrieved at the convenience of the user. Whether you’re using Dropbox, Google Drive or your cloud-based practice management program, all of these systems work the same way – allowing you to upload your data and access it through the Internet. While this type of data storage may … Read More
What is hosted cloud?
Hosted cloud is a way to take advantage of some of the benefits of the cloud while still using traditional in-office hardware. When using a hosted cloud system, the setup, software, infrastructure, and security are all maintained by a vendor and hosted on a server located elsewhere. The result is essentially a desktop you can access via the cloud, with … Read More
What encryption do law firms need?
Lawyers have a responsibility to take reasonable steps to protect the confidentiality of their client’s data under four primary ABA rules[1]: Rule 1.1, dealing with competence including that associated with technology Rule 1.4, addressing secure communication Rule 1.6, outlining the duty of confidentiality Rules 5.1-5.3, focusing on lawyer and nonlawyer relationships Individual state bar associations have addressed this as well, … Read More
What is two-factor authentication (2FA)?
Meant to be used as a supplement to passwords, two-factor authentication provides increased security to prevent unauthorized access to account logins. Also known as 2FA, this method adds another layer onto the login process to verify the user’s identity. What it does Two-factor authentication is essentially proving that the person who is trying to gain access to an account is … Read More
How do I become PCI Compliant?
To become Payment Card Industry Data Security Standard (PCI-DSS) compliant your firm must determine which DSS apply, and then perform the required tests to determine if your firm meets those standards.[1][2] This process is complicated because there are eight different PCI-DSS A self-assessment questionaires (SAQs) available for you to use to verify your firm’s compliance.[2] Which SAQ applies to your … Read More
What are the advantages to storing my law firm’s files in the cloud?
Law firms that want to maintain exclusive control over their electronic data may choose to store their data on an in-house server kept onsite at the firm’s location. But for firms that are not as concerned about exclusively controlling their electronic data, there are many advantages to using cloud file storage such as[1][2]: Cost Savings A reduction in IT costs … Read More
How can I export data from my online accounting program?
Most online accounting programs, with the exception of Quickbooks, allow users to export their data into MS Excel or . [1][3] You can export data directly from your generated reports or from the actual screen where you enter the data. You can export all Quickbooks transactions into specialized files such as .tlg or .iif, .qba, or .qbo that can only be … Read More
Should my law firm have its own server?
Although cloud-based storage is secure, convenient, and cost-effective, some law firms prefer not to store confidential client information on a server in the physical control of a third party. For this reason, some law firms consider using an rather than storing their client information on the cloud. If you have the resources to set up, secure, back up, and maintain … Read More
How can law firms protect data from a ransomware attack?
It is virtually impossible to ensure that your law firm is never hit by a ransomware attack. But there are steps that you can take to minimize the likelihood that such a cyber attack would succeed on your firm’s computer system, and to get your firm up and running as fast as possible after an attack[1][2]: Regularly back up your … Read More
Do law firms have to worry about ransomware?
is a type of that launches when an unsuspecting victim clicks on a link or attachment found in a “” email.[1][2] Once launched, the ransomware encrypts or locks all of your data files, and may lock each computer workstation and your entire computer network as well. Depending on the severity of the attack it can take weeks or months to … Read More