Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
The Reboot is dedicated to helping business owners and managers critically evaluate good and bad decisions on technology, cybersecurity, processes, marketing, sales and other important general business topics. All of us here on the The Reboot are business owners and entrepreneurs ourselves and work every day with professionals responsible with the success of many types of business across the country. We hope our topics give you some insight to a decision or challenge you’re facing today.Thes ...
…
continue reading
In recent weeks we have discussed WHY your business needs Cyber Insurance. Today we will dive into the requirements you MUST have in place to obtain an insurance policy. We are long past the days of having backup and antivirus. Just having a domain name and setting up email on M365 is not going to cut it; you need to setup SFP, DMARC, DKIM - withou…
…
continue reading
1
Your Day Before/After Your Law Firm Gets Cyber Attacked
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34
IT COMES BY TOTAL SURPRISE. It's one of those things you never think will happen to you because your "IT people have got you covered". Maybe you just never put much thought to it which makes it a bigger surprise. Or possibly, no one with IT cybersecurity knowledge has ever discussed it with you. In any case, your day was already busy enough but now…
…
continue reading
1
Services Your IT Company Should Be Providing
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
If you are outsourcing your IT Services, do you know what is included? Is it just desktop and infrastructure support? Does it include asset management and real time auditing of all of your software licenses? Is network security and backup for cloud services included? More importantly, are they properly insured? These are a few things that should be…
…
continue reading
1
3 BIG Hidden Facts On Cyber Liability Applications
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
Yawn.... I know but we need to talk about the big changes in the Cyber Liability application process and what was and now is being asked. The difference WILL SURPRISE you. If you're not ready for these changes, you may have a Cyber Liability claim DENIED at the worst possible time and when you need it the most. Jim reviews 4 Cyber Liability applica…
…
continue reading
1
Cyber Insurance Claim Denied: 3 Misconceptions That'll Cost You BIG!
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24
💥Claim Loopholes for not meeting insurance application requirements that will certainly cost your 100's of 1000's of dollars! 🔎During this show, Jim shows you the biggest misconceptions on Cyber Liability Insurance coverage and how to avoid them so your law firm is not surprised when you need help the most. 🛑That's what some law firms are finding d…
…
continue reading
1
Why Your Business Needs Cybersecurity Insurance Today
21:14
21:14
Play later
Play later
Lists
Like
Liked
21:14
There are a reported 2200 cyber attacks every day, which is nearly 1 cyberattack every 39 seconds. Nearly 95% of all digital breaches come from human error. 560,000 NEW pieces of malware are discovered EVERY DAY. Malware attacks cause an average loss of 50 days in time for businesses. This is only a small example of some staggering statistics. Toda…
…
continue reading
🎙️ Attention, lawyers & legal professionals! Let Jim Gast shed some light on the limitations of common antivirus . 🚫🛡️ I want to have honest talk about the usefulness (or lack thereof) of Antivirus against the vulnerabilities faced by law firms in today's threat landscape.💼🔓 No Law Firm Left Behind is made possible by our friends at SpliceNet Consu…
…
continue reading
1
Revisting The Importance of Customer Service Today
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15
The Reboot has discussed customer service in the past. Today we will discuss the importance of good customer service/support while faced with hiring and staffing challenges. Some companies are not able to hire the proper candidates that they desperately need. We will give some tips to keep your service high and maintain client satisfaction. #thereb…
…
continue reading
1
Cyber Compliance: Navigating Compliance Policies and Ensuring Staff Buy-In
36:00
36:00
Play later
Play later
Lists
Like
Liked
36:00
🔒 Join us as we explore the crucial topic of cybersecurity compliance policies for law firms. Guest/Attorney David Myers provides invaluable insights and practical strategies to keep your practice safe in the digital age. 💼 But it doesn't end there! We address the challenge of ensuring your law firm staff fully understand and review these policies.…
…
continue reading
1
Practical Steps to Prevent Downtime from Cyber Attacks
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11
Guest Rich Jack, ConnectWise Security Expert joins No Law Firm Left Behind to talk about the “New Practical" efforts that Law Firms leaders need to evaluate in securing your firm's client data, systems and infrastructure. Listen in as we explore risk assessment, threat mitigation, incident response, employee education, and more to fortify your firm…
…
continue reading
Large tech layoffs continue through 2023 with headlines showing thousands of people losing their jobs. Here is why the economy, interest rates and pandemic hiring are to blame. #thereboot #cybersecurity #techlayoffs #inflation #firedBy The Reboot Crew
…
continue reading
1
Security Policies – What Are They And Why Your Business Needs Them
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10
Your business needs an AUP if it uses internet access. AUPs are guidelines that protect your company's network. They also protect your business from lawsuits caused by an employee's negligent internet actions. These policies are essential for shielding your business from legal action. Today we will discuss the many different policies that your busi…
…
continue reading
1
Brian Redden’s Secret Success Formula For Post-COVID Startups
39:17
39:17
Play later
Play later
Lists
Like
Liked
39:17
🎙️ 📢 Join No Law Firm Left Behind, as we explore value-add representation for startup entrepreneurs with renowned lawyer Brian Redden. Discover cost-effective solutions, proactive risk management, and growth/exit strategies. Gain insights into finding the right legal advisor who understands your business goals. Don't miss the secrets to success in …
…
continue reading
In the day and age of sophisticated digital hackers, your concern shouldn’t be if you’re going to get hacked, but what you’re going to do when it happens. Investing in a security operations center (SOC) can be your saving grace during an attempted cybersecurity attack. Cybersecurity is no longer just an IT problem—it’s an organizational issue. #the…
…
continue reading
1
Step-by-Step Business Technology Plan For Your Law Firm Part 2
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56
Law Firm Technology and Security Plan. Tune in to our latest 30-minute session on how to create it. We discuss the second part of the plan after completing the technical and security assessment, including how to: -logically categorize items -identify the highest critical areas -evaluate pros and cons This expert insight will help you streamline you…
…
continue reading
Open AI was founded in 2015 by Elon Musk and is widely known today for its Chat GBT product. Today we will discuss Open Ai and how Microsoft is embracing this artificial intelligence technology into its cloud platforms. Microsoft allows you to use coding and language models to a variety of use cases, such as writing assistance, code generation and …
…
continue reading
1
Step-by-Step Business Technology Plan For Your Law Firm Part 1
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10
Step-by-Step Business Technology Plan For Your Law Firm IS IT important to have a technology plan for your law firm, or can you just buy some computers, software, email, and start working? The latter approach is unlikely to lead to success as the technology tools and processes you use can significantly impact your clients' satisfaction, firm profit…
…
continue reading
Most businesses today rely entirely on technology as a result of the digital transformations that have occurred over the past few years. This holds true for businesses of all sizes, including SMBs. The issue for SMBs is that they frequently require more internal talent to support and maintain their technology infrastructures. As a result, they are …
…
continue reading
1
5 Cybersecurity Risks & Ethical Challenges To Safeguard Client Data
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49
Join Jim Gast and guest Paul Unger to explore the ethical and security challenges of modern-day legal practices. Discover safe storage practices for confidential data and gain valuable insights on safeguarding client privacy. We'll also delve into the latest security risks and how to protect your client data. Stay ahead of the game and learn how to…
…
continue reading
In today’s digital age with the prominence of social media, targeted email phishing has become increasingly common in aiding wire transfer fraud. Wire transfers continue to be an attractive target of fraudulent activity due to the speed and finality of payment, as well as the lack of internal controls and employee education in how to avoid wire tra…
…
continue reading
1
How Microsoft 365 Powers Your Law Firm Growth
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
Learn how Microsoft 365 can do more and empower your law firm's growth. Jim's firsthand knowledge and valuable recommendations will help you discover how to collaborate and work more efficiently from anywhere while increasing security, and reduce your IT costs. Don't miss out on this opportunity to adapt your law firm to the new working conditions …
…
continue reading
1
Frustration To Confidence: Unlocking The Full Potential Of Your Software
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50
Host Jim Gast and guest Barron Henley, Affinity Consulting Group delve into the world of document automation and core production tools to explore how legal professionals are missing out on the full potential software such as Word, Outlook, Excel, Acrobat, and more. Despite these products being widely available and accessible, the legal industry is …
…
continue reading
In this episode, Jim Gast uncovers the hidden scams of IT companies and web developers. With the proliferation of technology and the increasing reliance on digital solutions, the demand for IT services has skyrocketed. However, with the increase in demand comes an increase in scams and fraudulent practices. Your host, Jim Gast is a seasoned IT prof…
…
continue reading
1
Parties & Roles In Your Client's Risk Management Strategy
32:16
32:16
Play later
Play later
Lists
Like
Liked
32:16
As a business attorney inevitably, you will be faced with addressing the Risk Management concerns for your client. These concerns may stem from a customer audit, cyber liability insurance requirements or maybe a concern about your client’s vendors. There are several parties that could be involved but understanding who and which should be responsibl…
…
continue reading
1
Using OSINT as part of the Reconnaissance Process
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
There are 7 steps in the Cyber Kill chain and the first one is Reconnaissance. This is the practice of collecting information on your target. This can be done in a Passive way or an Active Way. Today on the Reboot, we will discuss the ways to passively collect information using what is often referred to as OSINT or Open Source Intelligence. This ge…
…
continue reading
1
How VoIP Makes Lawyers Money & Gets Them New Clients
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58
No one wants to talk about a new phone system for their law firm UNTIL they realize how much more money they can make or how many more clients they can gain. Yes, a little thought of technology for your law firm, phones can add to the top line and bottom line. In this segment, we'll show how your outdated phone system is losing you clients and how …
…
continue reading
1
Overlooked Sources Of Cybersecurity Financial Liability
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05
Buried deep in any contract could be a common provision that leaves your law firm or your client's business financially liable for cybersecurity breaches. Don't just accept opposing counsel's language. Let David uncover this provision for you and discuss how to negotiate changing it to be less restrictive. This simple 101 level conversation can hel…
…
continue reading
1
Paul Unger, Affinity Consulting on NetDocuments/Worldox merger & Affinity/Lawyerist merger
33:57
33:57
Play later
Play later
Lists
Like
Liked
33:57
Paul Unger needs very little introduction as his vast history in Legal Tech & Lawyer Coaching speak volumes. Paul is renowned for his public speaking and writing in helping lawyers and their staff take his same pragmatic approach towards time management, personal productivity, and doc/data governance & security. He joins us on No Law Firm Left Behi…
…
continue reading
Cyber liability and Cybersecurity are not topics that will soon disappear from the lexicon of Law Firm leaders. However too many law firm leaders still remain considerably uninformed to their professional responsibilities and the devastating financial risks of their inaction or the actions of their staff. Jim and Dave review the Top 3 Cyber Problem…
…
continue reading
In keeping up with our busy schedules, why not turn to automation to lighten some of the manaul burden? Do more with less by streamlining repetitive tasks and business processes (while increasing efficiency and reducing cots) with Microsoft Power Automate. #thereboot #automation #microsoftpowerautomate #microsoftforms…
…
continue reading
With all of the automation available today, are you still leveraging direct mail? What some would consider 'junk mail' has turned profits for a lot of companies. Relying on automation, alongside direct mail can help bring in some future prospects for your company. #thereboot #directmail #marketing #marketingautomation…
…
continue reading
Now that we have returned to some normalcy when it comes to corporate travel, your risk for being compromised or breached is on the rise. Today we will discuss some key elements and outline a few things that you should be doing to ensure personal and business safety on your devices. Now is not the time to become complacent while working on the road…
…
continue reading
1
How Lawyer David Myers Niche Led to Success
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54
Caveat lector: Dave is my former business partner and for 10 years, we helped other lawyers find the "Gold Nuggets" in their law practice. Now he's found success in doing the same thing for himself, focusing on his niche, MSPs (of course). For our returning episode, I'll dissect what Dave and I did for years and show how he did it for himself to be…
…
continue reading
We all know the importance of customer satisfaction and employee retention. Are your customers satisfied? Do you have measurable results? Are you rewarding your awesome staff for getting kudos from your customers? Today we will share tips and ideas to help increase overall satisfaction from all of your customers! #thereboot #customersatisfaction #c…
…
continue reading
Common themes on The Reboot are Zero Trust and Cybersecurity. Today we will discuss steps and tools you can use to build a zero trust approach for your company. No one is safe from a cyber attack and we will also discuss recent breaches and potential ways the threat actors can gain privelaged access to your computers and data. #thereboot #zerotrus …
…
continue reading
1
Disaster Planning Checklist - What You Need To Know!
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30
Don't wait until it is to late to prepare yourself for a disaster. All to often controls or procedures are not in place, and that's where problems can occur. Today we will discuss key items to have on your checklist to help ensure staff can be productive and safe. #thereboot #disasterplanning #msp #drtesting…
…
continue reading
1
What To Look For In Your Security Awareness Training Provider
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11
Security awareness training is a formal process for educating employees and third-party stakeholders, like contractors and business partners, how to protect an organization's computer systems, along with its data, people and other assets, from internet-based threats or criminals. Today we will discuss some key things to look for in a security aware…
…
continue reading
1
FTC Safeguards Rule and what you need to do by December 9 2022!
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26
The Federal Trade Commission (FTC) has updated its Safeguards Rule. The new rule contains several new and/or updated cybersecurity and risk management requirements for auto dealerships and other non-banking financial firms. Compliance with and implementation of cyber hygiene and information security practices is no longer voluntary — but required b…
…
continue reading
1
Information Rights Management/Sensitivity Labeling
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05
Do you have sensitive documents stored on your local PC, server or the cloud? Are you protecting that data properly and securely? Today we will discuss some way you can secure that data using encryption, deny copy/paste function (if applicable), deny screenshots or even restrict printing of sensitive documents. You may already have the technology a…
…
continue reading
There is a negative connotation when we hear 'employee monitoring'. It's perceived as big brother looking over your shoulder. Today we will discuss some positive use cases for this and how it can actually benefit your employees. #theReboot #MSP #technology #cybersecurity #employeemonitoringBy The Reboot Crew
…
continue reading
1
Identifying Critical Assets and Determining Risk Profile
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12
Are you running unsupported desktops or servers in your corporate environment? You could be, and not even know it. Critical assets are not only IT assets - they can be a copyright, a patent, even a process or procedure. We will help you identify these critical assets and let you know the risk and liability you hold if you are using them. #theReboot…
…
continue reading
1
Claire E. Parsons, How Attorneys Can User Mindfulness For Success
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53
Our guest this week on No Law Firm Left Behind is Claire Parsons; mom, lawyer, community leader, writer, blogger, meditation expert, yoga instructor and chocolate zucchini bread maker. Yep, among all her amazing roles she still finds time to pour her heart into baking for her office colleagues. In fact, she puts her heart into all she does and is a…
…
continue reading
1
Are You Following Your Paid Professionals Advice?
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52
Are you paying a professional or expert (IT/Legal/Dr, etc) who is providing some level of advice, but you are not following it? It could be because of a lack of knowledge or understanding, certainly. It is possible that your risk is increasing if you do not follow the professionals advice. #theReboot #MSP #technology #cybersecurity #professionaladv…
…
continue reading
1
Leveraging Platforms for Project Management
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36
Are you struggling meeting some of your tasks for projects? The Reboot will discuss some of the project management platforms available today. You may be able to use existing tools or software that you are already paying for. #theReboot #MSP #technology #projectmanagement #marketingBy The Reboot Crew
…
continue reading
We will discuss how businesses can protect sensitive data by securing employee owned devices. We will also discuss some tools and methods you should be using to minize risk and exposure. #theReboot #MSP #technology #mdm #security #mobilesecurityBy The Reboot Crew
…
continue reading
1
Brandi Hann-Legal Admin Hot Topic Open Mic
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33
Brandi, Hann-Legal Admin Hot Topic Open Mic Legal Administrator roles have grown over the years to becoming the business managers of their Law Firms. HR, Finance, Technology, Security Operations and more have been welcomed additions to the already important responsibilities of the Legal Admin. In many situations, legal admins have become C-Levels f…
…
continue reading
The Reboot crew will discuss methods to assist you with setting measurable goals and assign accountability. We will also tap into Key Performance Indicators (KPI) and discuss best practices. #theReboot #MSP #technology #kpi #marketing #smartgoals #goalplanningBy The Reboot Crew
…
continue reading
1
Windows 365 and Azure (Windows) Virtual Desktop
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45
Today we will discuss what these DaaS products are, what they do and how they compare. #theReboot #MSP #technology #cybersecurity #marketing #wvd #azurevdBy The Reboot Crew
…
continue reading
1
Mike Brown's Mid-Year Law Firm Marketing Tune-up
25:53
25:53
Play later
Play later
Lists
Like
Liked
25:53
Question: Has the first half of 2022 been all you planned (or hoped) it would be for your law firm? If not, don't despair. There is still time to turn things around for 2022 and finish strong. Our perennial guest and friend Mike Brown, Internet Marketing Expert is here to help. He brings 25+ years of know-how to help your law firm yield the results…
…
continue reading
1
Debbie Foster, Affinity Consulting, Legal Tech Trailblazer
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35
Through her 25-year efforts, Debbie Foster has forged the model of what a Legal Tech should be. Her company Affinity Consulting and her awesome colleagues have and always will set the standard of what every Legal Technology Consultant should strive towards. Without question, she and her partners has helped more lawyers and legal professionals than …
…
continue reading