Archive for the ‘Uncategorized’ Category
The threat of a cybersecurity breach is always looming in today’s digital age. The past two years in particular have been fraught with enormous breaches at huge companies - companies like Target, Equifax, Yahoo, and the SEC.
In 2016, Ginni Rometty, IBM's chairman, president and CEO, said, "Cyber crime is the greatest threat to every company in the world." But the question isn’t who will be attacked next - the question is how are you preparing for it?Learn More
This summer, we surveyed a number of law firms to understand what technologies they are using in the IT landscape.
The results revealed how technology purchase decisions are made, areas of workflow inefficiencies and opportunities for improvement for firms. Reviewing these findings can be beneficial for any law firm with the initiative to evaluate how they compare to other firms in selecting and implementing technology.Learn More
We recently completed a survey of modern law firms and their operational technology habits and choices. While the study was primarily focused on how firms use organizational document software, we were also able to glean the pain points and barriers law firms come up against when trying to implement new technology. New technology can often be the best solution for day-to-day inefficiencies or for long term organizational planning - and yet, it's not always easy to get.Learn More
We have all been there. Getting a request to find a document on a case that was closed three years ago because it could have relevance for a current case. You put on your thinking cap and start searching through all of the possible places it could be. Nothing comes up. You give it another shot. Nada. Zip. Zilch.Learn More