So which is more secure- an unencrypted email attachment or a client portal? Well, that is sort of a trick question because most everything is more secure than an unencrypted email attachment. And normally one would use the phrase “secure client portal” because by definition, client portals should be secure. Security key

In this recent Oklahoma Bar

Trust account management is an important subject for lawyers in private practice and our Digital Edge podcast Trust Accounting for Lawyers has some great information and tips from a Shelia Blackfordknowledgeable authority. Sheila Blackford is an attorney and practice management advisor for the Oregon State Bar Professional Liability Fund. She is also the author of an

Last week many Oklahoma Bar members received an email with a subject line of "Oklahoma Bar Association Complaint." Of course it was a fake. Our General Counsel's office does not send out these types of official notices by email. But cyber criminals hope that the surprise and horror at reading a complaint has been filed

Discussions about metadata used to be very common in law office management and technology circles. You do not hear as much about that topic today, primarily because Microsoft Word and Corel WordPerfect have built-in metadata scrubbers. But, as with other Donna Paynetechnology-based developments there are often new challenges and now is a good time to brush

Information Security is an increasingly important topic. It is also a subject matter where relatively few lawyers have much background or training. Lawyers do have great experience learning from the experts where all types of subject matters are concerned. My friends and colleagues, Sharon Nelson, David Ries and John Simek are experts in this field.

No PhishingHere is a guest post from my colleague Laura A. Calloway, Director of Service Programs for the Alabama State Bar. She has been a practice management advisor for a few weeks longer than I have (and, even after all these years, she never lets me forget it.) These latest spear phishing attacks that purport to