Blogs

4 people like this.
Windows Hello for Business (WHfB) is a feature at the heart of Microsoft’s strategy for built-in password-less authentication. Hello for Business harnesses biometrics in allowing the unlocking of a device via face, iris, fingerprint, security key/smart card or PIN for domain-joined physical Windows desktops and laptops. WHfB can use these biometrics in combination with multi-factor authentication (MFA) to create an authentication experience that is not only stronger than traditional passwords, but also less time consuming and error prone to the end user. Traditional password sign-ins are vulnerable to various attacks, e.g., phishing, and brute force. WHfB uses ...
0 comments
1 person like s this.
Please enjoy this blog posted on behalf of: Josh Moore, Lead Solutions Expert, NetDocuments. In today's rapidly evolving technological landscape, the legal industry finds itself at the crossroads of tradition and innovation. Law firms, renowned for their adherence to established practices and rigorous standards, are increasingly recognizing the need to embrace technology to enhance their operations, streamline processes, and remain competitive in an ever-changing business environment. While legal technology solutions designed explicitly for the legal profession undoubtedly hold immense value, there exists a vast array of non-legal specific tools ...
0 comments
1 person like s this.
Please enjoy this blog posted on behalf of the author Rabiya Hirji, Solution Advisory Director, Risk Products, Intapp. Rabiya Hirji has over 20 years in-house risk experience and six years of risk consulting experience. In her role as Solution Advisory Director at Intapp, Rabiya helps firms optimize their investments in risk and compliance technology. In today’s hypercompetitive legal market, law firms are under even more pressure to start working with new clients as soon as possible. And the most time-consuming part of new business intake is reviewing, reporting, and clearing conflicts. As a risk consultant with years of experience, clients often ...
0 comments
2 people like this.
Please enjoy this blog post authored by Mark Manoukian, IT Director, Kegler, Brown, Hill & Ritter. Kegler Brown has, without a doubt, moved to a hybrid model. While the bulk of our non-attorneys are back in the office, our 65 attorneys split their time between the office and elsewhere. It is fair to say that we are only able to move to a hybrid model because of the revolutionary changes to the meeting tools that took place during the pandemic when we were working remotely. These same tools, particularly improvements in video and audio conferencing, will continue to serve us well as we adjust to a hybrid model. Before the pandemic we used service-based ...
0 comments
1 person like s this.
By: Cindy Foellmer - Sidley Austin LLP, Parita Kanevskiy - Eversheds Sutherland (US) LLP and Dawn Sheridan - Thompson Coburn LLP 1. Think about your project before you create the Team. What channels are needed? Will any of them need to be private? a. Example: you cannot set a General channel to private. If you have internal conversations in the General channel and then later need to add a third party (e.g., vendor), they will be able to see the prior discussions. If you know you need a private channel, create that in the beginning so you don't have to create additional channels. 2. ...
1 comment
1 person like s this.
By: Cindy Foellmer - Sidley Austin LLP, Parita Kanevskiy - Eversheds Sutherland (US) LLP and Dawn Sheridan - Thompson Coburn LLP Teams is integrated with Microsoft 365, which means it is tied to other Microsoft Office services, such as Word and Excel, as well as its cloud storage and sharing services such as SharePoint, PowerPoint, OneNote, Tasks by Planner and To do (formerly referred to as Planner), and Power BI. Since we have started using Teams, the amount of email traffic within our departments has decreased significantly. Here are some ways we were able to achieve this outcome: a. Create a Teams site for each project. b. Provide ...
1 comment
1 person like s this.
***Please enjoy this blog post which is posted on behalf of the author, Laura Murphy, Product Manager - Closing Folders, iManage. The past few years have catapulted the legal world into new ways of working. One significant change is the adoption and acceptance of electronic signatures. It is now possible to digitally sign documents and complete deals from the comfort of your home office rather than the corporate boardroom. Adding the required IT infrastructure and systems to support these new needs and evolving demands requires consideration of the wider ecosystem of systems, security, applications, devices, and processes. Here we will walk through ...
0 comments
Be the first person to like this post.
Please enjoy this blog post authored by Rebecca Sattin, CIO, Worldox. Before COVID-19, most people worked in an office. Some firms had solutions in place for those who worked remotely periodically, but most people came into the office to work. That is where their files were, their phones, their colleagues, and their office staff. Then in March of 2020, everything changed very quickly. Whether or not firms had remote work plans in place, they had to put something together immediately. At that point everyone’s main concern was ensuring people could continue working. Security may have been a concern, but the priority was to ensure the firm could stay in business ...
0 comments
1 person like s this.
Please enjoy this blog post authored by Neil Failla, Operations and Managed Services Manager, Cornerstone Information Technologies, LLC. When the pandemic began in 2020, firms were faced with the reality that workers would no longer be heading into the office. Instead, they would stay right at home, the new “office." Firms that were prepared--that had remote technologies like secure access Virtual Desktops; Virtual Private Networks (VPNs); Cloud based applications; and stacks of consistent imaged Laptops/Tablets available -- have fared better than those who were lagging the technology curve. Over the past year, the race has been on to deploy hardware, ...
0 comments
Be the first person to like this post.
By Kian Poon, Director, Intapp Strategic Consulting More and more legal firms are relying on AI-based technology to unburden their professionals from substantial amounts of manual work, especially labor-intensive data analysis. However, prior to implementing AI, firm leaders and professionals must take critical steps to ensure they truly understand the state of their underlying data. Firms must consider the structure — or lack thereof — of key data, their sources, approaches to data extraction and data collection, and how to organize and analyze the data. Collecting and analyzing data is a daunting task for many firms, especially as the volume, velocity, ...
0 comments
1 person like s this.
Please enjoy this blog post authored by Navdeep Vohra, Senior Manager, Data Architect & Management at Borden Ladner Gervais LLP (BLG). Data extraction can be defined as the process where data is retrieved from various data sources for further data processing and analysis to gather valuable business insights or storage in a central Data Warehouse. The data obtained from different sources can be unstructured, semi-structured, or structured. Corporations, individuals, or companies frequently extract data to analyze it using Business Intelligence (BI) tools, migrate the data to a repository, or replicate data as a backup. Data Extraction is the first ...
1 comment

What Is NIST Anyway

Be the first person to like this post.
With heightened focus on information security, there is a growing interest among law firms to adopt security standards to help protect their information assets. Many firms have voluntarily opted to align and/or certify their information services with the information security framework of ISO 27001. Driven by client demand, many firms are also exploring the integration of security and privacy controls defined in NIST 800-53, Revision 4 (April, 2013). NIST 800-53, Revision 4 is a special publication that provides guidelines for selecting and specifying security controls for organizations and information systems that support executive agencies of the Federal ...
0 comments
Be the first person to like this post.
ILTA members continue to submit topic questions to the IDEA Database, and this is really helping drive some great discussion for content. As people look at mobility, VDI is one of those delivery methods at the top of the list. An idea was submitted revolving around VDI, and it was posed as a question “VDI – Does it still make sense?” This is a great question, and there’s a lot of room for discussion. Especially when it comes to the questions: Is it cost effective (CapEx or OpEx)? What about the server hardware infrastructure compared to simple physical desktops? Performance cannot be that great with VDI…can it? Is it difficult ...
0 comments