-
May 24, 2018 Article
Only Use Trusted Wi-Fi Networks
Only Use Trusted Wi-Fi Networks When Connecting to the Internet. Using a public Wi-Fi network not only puts your devices Read More
-
May 22, 2018 Article
Social Media Applications Could Contain Malware
Social Media Applications Could Contain Malware or Trojan Horses. Avoid Installing Unnecessary 3rd Party Apps, and Restrict Your Sharing Settings. Read More
-
May 21, 2018 Article
Keep Sensitive Data Secure
With major data breaches being reported all too frequently, organizations are now placing increased emphasis on the security of personal, Read More
-
May 20, 2018 CLEVideo
Running a Better Law Firm Using Project Management
Managing your firm’s cases can be overwhelming, especially during times of growth and high-performance.
-
May 18, 2018 Article
Practice Management Basics
So now that you have a law firm, how do you stay organized and best accomplish your clients’ goals? How Read More
-
May 10, 2018 Article
Common Security Myth – I Don’t Have Anything a Hacker Would Want
Yes, you do. Hackers want to control your PC to send spam, distribute malware, or help launch a denial of Read More
-
May 9, 2018 Article
Common Microsoft Word Formatting Mistakes and How to Fix Them
Microsoft Word is invaluable for lawyers, but it also comes with a lot of quirks. Fortunately, for many common annoyances Read More
-
May 9, 2018 CLEVideo
How to Manage Your Email Using Technology – and Get Your Time and Sanity Back
Managing email is easy when you have a clear set of boundaries and rules, and when you can “train” your inbox to do most of the sorting for you
-
May 9, 2018 Article
Scan Your Computer
After you have installed an anti-virus and/or anti-spyware package, you should scan your entire computer periodically. If your anti-virus package Read More
-
May 8, 2018 Article
Know How to Spot Fake Software
We’ve all seen the pop-up windows telling us that our computer is infected with a virus or other malware. Don’t Read More
- View All