show episodes
 
Artwork

1
No Law Firm Left Behind

Jim Gast, Law Firm Tech & Cyber Consultant

Unsubscribe
Unsubscribe
Monthly
 
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
  continue reading
 
Artwork

1
The Reboot

The Reboot Crew

Unsubscribe
Unsubscribe
Monthly
 
The Reboot is dedicated to helping business owners and managers critically evaluate good and bad decisions on technology, cybersecurity, processes, marketing, sales and other important general business topics. All of us here on the The Reboot are business owners and entrepreneurs ourselves and work every day with professionals responsible with the success of many types of business across the country. We hope our topics give you some insight to a decision or challenge you’re facing today.Thes ...
  continue reading
 
Loading …
show series
 
In recent weeks we have discussed WHY your business needs Cyber Insurance. Today we will dive into the requirements you MUST have in place to obtain an insurance policy. We are long past the days of having backup and antivirus. Just having a domain name and setting up email on M365 is not going to cut it; you need to setup SFP, DMARC, DKIM - withou…
  continue reading
 
IT COMES BY TOTAL SURPRISE. It's one of those things you never think will happen to you because your "IT people have got you covered". Maybe you just never put much thought to it which makes it a bigger surprise. Or possibly, no one with IT cybersecurity knowledge has ever discussed it with you. In any case, your day was already busy enough but now…
  continue reading
 
If you are outsourcing your IT Services, do you know what is included? Is it just desktop and infrastructure support? Does it include asset management and real time auditing of all of your software licenses? Is network security and backup for cloud services included? More importantly, are they properly insured? These are a few things that should be…
  continue reading
 
Yawn.... I know but we need to talk about the big changes in the Cyber Liability application process and what was and now is being asked. The difference WILL SURPRISE you. If you're not ready for these changes, you may have a Cyber Liability claim DENIED at the worst possible time and when you need it the most. Jim reviews 4 Cyber Liability applica…
  continue reading
 
💥Claim Loopholes for not meeting insurance application requirements that will certainly cost your 100's of 1000's of dollars! 🔎During this show, Jim shows you the biggest misconceptions on Cyber Liability Insurance coverage and how to avoid them so your law firm is not surprised when you need help the most. 🛑That's what some law firms are finding d…
  continue reading
 
There are a reported 2200 cyber attacks every day, which is nearly 1 cyberattack every 39 seconds. Nearly 95% of all digital breaches come from human error. 560,000 NEW pieces of malware are discovered EVERY DAY. Malware attacks cause an average loss of 50 days in time for businesses. This is only a small example of some staggering statistics. Toda…
  continue reading
 
🎙️ Attention, lawyers & legal professionals! Let Jim Gast shed some light on the limitations of common antivirus . 🚫🛡️ I want to have honest talk about the usefulness (or lack thereof) of Antivirus against the vulnerabilities faced by law firms in today's threat landscape.💼🔓 No Law Firm Left Behind is made possible by our friends at SpliceNet Consu…
  continue reading
 
The Reboot has discussed customer service in the past. Today we will discuss the importance of good customer service/support while faced with hiring and staffing challenges. Some companies are not able to hire the proper candidates that they desperately need. We will give some tips to keep your service high and maintain client satisfaction. #thereb…
  continue reading
 
🔒 Join us as we explore the crucial topic of cybersecurity compliance policies for law firms. Guest/Attorney David Myers provides invaluable insights and practical strategies to keep your practice safe in the digital age. 💼 But it doesn't end there! We address the challenge of ensuring your law firm staff fully understand and review these policies.…
  continue reading
 
Guest Rich Jack, ConnectWise Security Expert joins No Law Firm Left Behind to talk about the “New Practical" efforts that Law Firms leaders need to evaluate in securing your firm's client data, systems and infrastructure. Listen in as we explore risk assessment, threat mitigation, incident response, employee education, and more to fortify your firm…
  continue reading
 
Your business needs an AUP if it uses internet access. AUPs are guidelines that protect your company's network. They also protect your business from lawsuits caused by an employee's negligent internet actions. These policies are essential for shielding your business from legal action. Today we will discuss the many different policies that your busi…
  continue reading
 
🎙️ 📢 Join No Law Firm Left Behind, as we explore value-add representation for startup entrepreneurs with renowned lawyer Brian Redden. Discover cost-effective solutions, proactive risk management, and growth/exit strategies. Gain insights into finding the right legal advisor who understands your business goals. Don't miss the secrets to success in …
  continue reading
 
In the day and age of sophisticated digital hackers, your concern shouldn’t be if you’re going to get hacked, but what you’re going to do when it happens. Investing in a security operations center (SOC) can be your saving grace during an attempted cybersecurity attack. Cybersecurity is no longer just an IT problem—it’s an organizational issue. #the…
  continue reading
 
Law Firm Technology and Security Plan. Tune in to our latest 30-minute session on how to create it. We discuss the second part of the plan after completing the technical and security assessment, including how to: -logically categorize items -identify the highest critical areas -evaluate pros and cons This expert insight will help you streamline you…
  continue reading
 
Open AI was founded in 2015 by Elon Musk and is widely known today for its Chat GBT product. Today we will discuss Open Ai and how Microsoft is embracing this artificial intelligence technology into its cloud platforms. Microsoft allows you to use coding and language models to a variety of use cases, such as writing assistance, code generation and …
  continue reading
 
Step-by-Step Business Technology Plan For Your Law Firm IS IT important to have a technology plan for your law firm, or can you just buy some computers, software, email, and start working? The latter approach is unlikely to lead to success as the technology tools and processes you use can significantly impact your clients' satisfaction, firm profit…
  continue reading
 
Most businesses today rely entirely on technology as a result of the digital transformations that have occurred over the past few years. This holds true for businesses of all sizes, including SMBs. The issue for SMBs is that they frequently require more internal talent to support and maintain their technology infrastructures. As a result, they are …
  continue reading
 
Join Jim Gast and guest Paul Unger to explore the ethical and security challenges of modern-day legal practices. Discover safe storage practices for confidential data and gain valuable insights on safeguarding client privacy. We'll also delve into the latest security risks and how to protect your client data. Stay ahead of the game and learn how to…
  continue reading
 
In today’s digital age with the prominence of social media, targeted email phishing has become increasingly common in aiding wire transfer fraud. Wire transfers continue to be an attractive target of fraudulent activity due to the speed and finality of payment, as well as the lack of internal controls and employee education in how to avoid wire tra…
  continue reading
 
Learn how Microsoft 365 can do more and empower your law firm's growth. Jim's firsthand knowledge and valuable recommendations will help you discover how to collaborate and work more efficiently from anywhere while increasing security, and reduce your IT costs. Don't miss out on this opportunity to adapt your law firm to the new working conditions …
  continue reading
 
Host Jim Gast and guest Barron Henley, Affinity Consulting Group delve into the world of document automation and core production tools to explore how legal professionals are missing out on the full potential software such as Word, Outlook, Excel, Acrobat, and more. Despite these products being widely available and accessible, the legal industry is …
  continue reading
 
In this episode, Jim Gast uncovers the hidden scams of IT companies and web developers. With the proliferation of technology and the increasing reliance on digital solutions, the demand for IT services has skyrocketed. However, with the increase in demand comes an increase in scams and fraudulent practices. Your host, Jim Gast is a seasoned IT prof…
  continue reading
 
As a business attorney inevitably, you will be faced with addressing the Risk Management concerns for your client. These concerns may stem from a customer audit, cyber liability insurance requirements or maybe a concern about your client’s vendors. There are several parties that could be involved but understanding who and which should be responsibl…
  continue reading
 
There are 7 steps in the Cyber Kill chain and the first one is Reconnaissance. This is the practice of collecting information on your target. This can be done in a Passive way or an Active Way. Today on the Reboot, we will discuss the ways to passively collect information using what is often referred to as OSINT or Open Source Intelligence. This ge…
  continue reading
 
No one wants to talk about a new phone system for their law firm UNTIL they realize how much more money they can make or how many more clients they can gain. Yes, a little thought of technology for your law firm, phones can add to the top line and bottom line. In this segment, we'll show how your outdated phone system is losing you clients and how …
  continue reading
 
Buried deep in any contract could be a common provision that leaves your law firm or your client's business financially liable for cybersecurity breaches. Don't just accept opposing counsel's language. Let David uncover this provision for you and discuss how to negotiate changing it to be less restrictive. This simple 101 level conversation can hel…
  continue reading
 
Paul Unger needs very little introduction as his vast history in Legal Tech & Lawyer Coaching speak volumes. Paul is renowned for his public speaking and writing in helping lawyers and their staff take his same pragmatic approach towards time management, personal productivity, and doc/data governance & security. He joins us on No Law Firm Left Behi…
  continue reading
 
Cyber liability and Cybersecurity are not topics that will soon disappear from the lexicon of Law Firm leaders. However too many law firm leaders still remain considerably uninformed to their professional responsibilities and the devastating financial risks of their inaction or the actions of their staff. Jim and Dave review the Top 3 Cyber Problem…
  continue reading
 
Now that we have returned to some normalcy when it comes to corporate travel, your risk for being compromised or breached is on the rise. Today we will discuss some key elements and outline a few things that you should be doing to ensure personal and business safety on your devices. Now is not the time to become complacent while working on the road…
  continue reading
 
Caveat lector: Dave is my former business partner and for 10 years, we helped other lawyers find the "Gold Nuggets" in their law practice. Now he's found success in doing the same thing for himself, focusing on his niche, MSPs (of course). For our returning episode, I'll dissect what Dave and I did for years and show how he did it for himself to be…
  continue reading
 
We all know the importance of customer satisfaction and employee retention. Are your customers satisfied? Do you have measurable results? Are you rewarding your awesome staff for getting kudos from your customers? Today we will share tips and ideas to help increase overall satisfaction from all of your customers! #thereboot #customersatisfaction #c…
  continue reading
 
Common themes on The Reboot are Zero Trust and Cybersecurity. Today we will discuss steps and tools you can use to build a zero trust approach for your company. No one is safe from a cyber attack and we will also discuss recent breaches and potential ways the threat actors can gain privelaged access to your computers and data. #thereboot #zerotrus …
  continue reading
 
Don't wait until it is to late to prepare yourself for a disaster. All to often controls or procedures are not in place, and that's where problems can occur. Today we will discuss key items to have on your checklist to help ensure staff can be productive and safe. #thereboot #disasterplanning #msp #drtesting…
  continue reading
 
Security awareness training is a formal process for educating employees and third-party stakeholders, like contractors and business partners, how to protect an organization's computer systems, along with its data, people and other assets, from internet-based threats or criminals. Today we will discuss some key things to look for in a security aware…
  continue reading
 
The Federal Trade Commission (FTC) has updated its Safeguards Rule. The new rule contains several new and/or updated cybersecurity and risk management requirements for auto dealerships and other non-banking financial firms. Compliance with and implementation of cyber hygiene and information security practices is no longer voluntary — but required b…
  continue reading
 
Do you have sensitive documents stored on your local PC, server or the cloud? Are you protecting that data properly and securely? Today we will discuss some way you can secure that data using encryption, deny copy/paste function (if applicable), deny screenshots or even restrict printing of sensitive documents. You may already have the technology a…
  continue reading
 
Are you running unsupported desktops or servers in your corporate environment? You could be, and not even know it. Critical assets are not only IT assets - they can be a copyright, a patent, even a process or procedure. We will help you identify these critical assets and let you know the risk and liability you hold if you are using them. #theReboot…
  continue reading
 
Our guest this week on No Law Firm Left Behind is Claire Parsons; mom, lawyer, community leader, writer, blogger, meditation expert, yoga instructor and chocolate zucchini bread maker. Yep, among all her amazing roles she still finds time to pour her heart into baking for her office colleagues. In fact, she puts her heart into all she does and is a…
  continue reading
 
Are you paying a professional or expert (IT/Legal/Dr, etc) who is providing some level of advice, but you are not following it? It could be because of a lack of knowledge or understanding, certainly. It is possible that your risk is increasing if you do not follow the professionals advice. #theReboot #MSP #technology #cybersecurity #professionaladv…
  continue reading
 
Brandi, Hann-Legal Admin Hot Topic Open Mic Legal Administrator roles have grown over the years to becoming the business managers of their Law Firms. HR, Finance, Technology, Security Operations and more have been welcomed additions to the already important responsibilities of the Legal Admin. In many situations, legal admins have become C-Levels f…
  continue reading
 
Question: Has the first half of 2022 been all you planned (or hoped) it would be for your law firm? If not, don't despair. There is still time to turn things around for 2022 and finish strong. Our perennial guest and friend Mike Brown, Internet Marketing Expert is here to help. He brings 25+ years of know-how to help your law firm yield the results…
  continue reading
 
Through her 25-year efforts, Debbie Foster has forged the model of what a Legal Tech should be. Her company Affinity Consulting and her awesome colleagues have and always will set the standard of what every Legal Technology Consultant should strive towards. Without question, she and her partners has helped more lawyers and legal professionals than …
  continue reading
 
Loading …

Quick Reference Guide