This eBook discusses some of the barriers to “strategic” IT in small to medium-sized law firms, why it matters, and how changing the nature of IT can have a measurable…
We had the chance to sit down (virtually) with Sarah Stromberg, President-Elect & Chair of the Business Partnering Committee of the Mile High Chapter Association of Legal Administrators. Sarah chats about her experience…
While securing client and firm data has always been a minimum requirement for law firms, the onslaught of successful ransomware attacks over the past 12 months undeniably demonstrates that information…
Passwords get stolen. It’s a reality of the world we live in. Multi-factor Authentication (MFA) prevents data breaches at law firms caused by stolen credentials.
Business continuity and disaster recovery (BC/DR) plans went through a universal stress test last year the likes of which have never been seen before. As we start to emerge from…
Our greatest assets here at Afinety are our extraordinary and dedicated employees who look for ways each day to maintain excellent client service and find new ways to deliver value…
Why Should a Small/Mid-Sized Law Firm Worry So Much about Cybersecurity? In a recent article, Managing Editor Zeljka Zorz of Help Net Security wrote: “Businesses in the Professional Services industry…
In our last blog post, we highlighted the importance of making IT a partner when defining law firm strategy. In this post, we’ll talk about some of the barriers to…
However, as functions, Operations and IT are all too often considered tactical enablers rather than drivers that serve as an equal partner in setting and executing firm strategy. This approach…
We sat down with Steve Adnopoz, a public finance/municipal securities lawyer and partner at Pearlman & Miranda, LLC. We chatted with Steve about the role of IT within the firm,…
As we head into the middle of March, I’m struck by how quickly 2021 is progressing. Here at Afinety, we are also making concerted progress on several fronts. I want…
In this eBook, we review 10 best practices that managing partners, firm administrators, operations managers, and IT directors should keep in mind across a range of different vulnerability points. Spanning…