Blogs

Be the first person to like this post.
Hello - We've had Office 2016 and Windows 10 in place for months now, and we continue to experience the grayed-out print button in Outlook.  For us, the issue occurs with any version of the HP Universal Print Driver.  If we switch to another driver, the issue goes away.  We'd really like to resolve this with the UPD since our tray settings and macros are all configured with that driver.  So far HP and Microsoft have not been much help, essentially blaming the other for the issue. I know others have experienced this, and I'm just wondering if there are any further developments.  Has anyone made any progress on this issue?  Thank you!!
0 comments

TimeSlips SME

Be the first person to like this post.
Can anyone recommend a TimeSlips SME? A small NYC firm is seeking a contractor to help them out.
0 comments
1 person like s this.
Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company. Even when an investigation becomes necessary, computer forensics and collecting data is often an afterthought. This can lead to serious legal problems as well as impede the investigation of employee deception. Did an employee leave and start working with a competitor? Did they take any of your confidential ...
0 comments
Be the first person to like this post.
Today’s law firms have a problem. The technology that was developed to help firms better serve their clients actually has many attorneys feeling like they are treading water – and barely keeping their heads up. Attorneys are faced with increasing pressure to quickly adopt and master new tools to bill, work, and collaborate better and faster. It’s hard to do anything faster when you’re flummoxed by the skills needed to reach the high bar of technological excellence. As law firms and legal departments continue to look to technology solutions to help their offices maximize efficiency, many attorneys feel that they are being left behind. Or worse, ...
0 comments
Be the first person to like this post.
Participants in Bluelock's 2018 Legal Survey will be entered to win one of 125 $20 Amazon gift cards. As an ILTA Gold Sponsor, Bluelock is dedicated to assisting the legal industry in its IT challenges. To better understand current practices in handling unprecedented pressure from clients and growing IT threats, we are conducting a legal data protection and recovery survey. All roles within a law firm are encouraged to participate. The survey takes approximately 5 minutes to complete. All responses will be kept strictly confidential and the results will be shared anonymously.  Take the survey here:  https://www.surveymonkey.com/r/2T3528
0 comments
Be the first person to like this post.
As a vendor, we don’t post often in this forum out of respect for the community’s peer-to-peer emphasis. However, Bluelock recently put together a comprehensive list of technology predictions with the help of 15 different experts within the legal industry. This eBook includes insights from Bluelock, law firm partners, associates and a variety of companies that service the legal industry. It includes 50 pages of insights, covering seven categories: Operations, Cybersecurity, Compliance & Regulations, Business Continuity & Disaster Recovery, Artificial Intelligence, Workforce and Major Technology Disruptions. Readers will learn the following from ...
0 comments
Be the first person to like this post.
An entire empire has been built on stealing sensitive company data, holding data hostage or releasing scandalous information to the public. This has made cyberattacks the   No. 1 threat for businesses , according to data from the Business Continuity Institute. But despite precautions, these breaches are still occurring at an   alarming rate . What could law firms be doing better? It’s no secret that data security is essential to our modern, technology-driven marketplace. With the internet of things and artificial intelligence growing commonplace, the expectations for continued innovation and constant availability are stronger than ever. The personal ...
0 comments
1 person like s this.
We've all heard it before from our users. " Not another email from the HelpDesk " or " Anytime I see an email from the HelpDesk, I just hit delete "  While communication is paramount, at what point do we over communicate to our users.  And, do we need to communicate everything.   Not every incident requires widespread disclosure.  One could argue that it is better to over communicate, however, I wonder if sending too many emails delivers a wrong message.  We want our users to feel confident that our systems are online and without issues.  On the flip side, proactively letting our users know about the incident can go a long way to build trust. Perhaps email is ...
0 comments
Be the first person to like this post.
The digital transformation of a law firm starts with lowering risk. Today, law firms are under unprecedented pressure from clients and auditors to implement and prove effective IT capabilities. This pressure is driving more firms to offload their IT disaster recovery (DR) process to  Disaster Recovery-as-a-Service (DRaaS)  vendors. We’ve listed four key benefits of DRaaS below that can empower IT transformation within your law firm: DRaaS Drives Efficiency for Your Law Firm Tired of your IT team struggling to keep IT systems available for critical business operations? A DR strategy aims to relieve this stress, but sometimes lack of planning, ...
0 comments
1 person like s this.
Agile working is all about creating a flexible and productive work environment. This includes delivering applications that allow your people to work anywhere, and sometimes any way, they choose. This can be challenging from an application perspective because some legacy systems are not very mobile friendly. However, for some firms the increase in adoption of cloud services has enhanced agile work practices. Cloud applications are more mobile friendly and while cloud services should be approached and considered with caution, selecting the right provider can also improve the mobility and flexibility of your applications. Another consideration is how do you protect ...
0 comments
Be the first person to like this post.
As I am in the field meeting with law firms we support, there are common themes that come up as it relates to workflow: "No fires"- Firms must have a vendor that will be proactive and assure their office runs smoothly on a consistent basis. Equipment working, supplies on hand and someone to speak with in the event they have a need and checking in on a quarterly basis. Relationship/rapport/trust, huge! Converting to digital-Firms are currently in the midst of scanning their documents into digital format or looking to implement within their firms some time soon. Conference rooms-Working remotely becoming more prevalent; interactive display units ...
0 comments
1 person like s this.
Today’s law firm clients are more interested in value than ever before and have never been less loyal to outside counsel. Ryan Steadman, Customer Value Engineer at Tikit North America, argues that in response, firms urgently need to up their game across a handful of business critical disciplines including data security, process efficiency, project management, relationship data science, and matter transparency and collaboration if they want client relationships to prosper. In this blog he addresses some of these themes. I’m seeing a sizeable shift in how legal services delivery is changing. It’s true that the old certainties of cryptic ...
0 comments
Be the first person to like this post.
Today, maybe because of work, I was in good mood to talk about ransomware. Has I noticed such cases had a big boom in 2016. It is not impressive since every study planned this augmentation of ransomware attack ... What is a ransomware A ransomware is the contraction of ransom & malware. It’s a program designed to encrypt all your files using strong encryption algorithm. For the most basic one… More advanced ransomware can also combine spyware (spy malware) functions and try to extract precious information from your computer or company. In all cases, you will need to pay around 2 to 8 bitcoins to get the decryption key. (1 bitcoin ...
0 comments
1 person like s this.
When it comes to the overheads in your business, many are in plain view and easy to see – labor costs, for instance, and materials. But all too many businesses find they are somehow losing money every month, and struggle to see exactly where it’s slipping away. Poor space utilization can be a major culprit – and if you doubt that, remember that a desk costs around $14,800 per year throughout New York. So what’s the secret of tackling this drain on your resources? You need the tools to help staff book space and facilities easily if they are to work effortlessly and maintain their productivity. Meeting room booking systems can provide concrete ...
1 comment
Be the first person to like this post.
As humans, our nature is to collaborate. We are social beings; we work together, learn from each other, help one another, and entertain. This is why threat intelligence sharing has become such a hot topic for IT professionals. But, there are better ways to share than what we have seen in the wild. Exchanging information bits from machine-to-machine can be effective as an alerting mechanism, but it simply can’t produce the context rich threat intelligence that results from cyber defenders banded together against common threats. We were encouraged to see the Executive Order come out in February to promote private sector threat information sharing . Threat ...
0 comments