Posts by Guest Contributor:

Group of people discussing their disaster plan

A Few More Important Things About Preparing for a Disaster

Our first discussion about disasters covered types of disasters and some basics needed to properly address a disruption in normal activities, including how to build a robust team. We subsequently outlined how to make use of staging areas, alternative facilities, and working from home in the second article. EDUCATION Employees: Educating employees is an ongoing initiative. While not every employee needs the same level of education, it is critical to continue the disaster education process throughout the year for all employees. Wardens: The level of disaster education for wardens is more intense. Wardens must be better prepared and be willing […]

Team members working together in an office

More to Know About Preparing for a Disaster

Our first discussion about disasters addressed several types of disasters and some basics needed to properly address disruption in normal activities. Please reference part one to learn more about disaster types and how to build a robust team. STAGING AREAS. When a disaster strikes, it is critical to know where everyone is located. Wardens. For this purpose, wardens should be appointed, each to be responsible for a specific list of employees. A warden should also be appointed to contact business partners. Contact can be accomplished via VoiceShot or another mass communication platform. Locations. Identify staging areas for each office location. […]

Employees in a meeting

Are You Prepared for a Disaster?

Disasters can take many forms for an organization. They might include a compromised computer, a power outage, severe weather, an active shooter situation, a bombing, or a virus. Some of these situations are not as severe as others, but all need a plan to protect employees, clients, business partners, data, and files. An organization needs a plan which: Identifies levels of disasters and responses Identifies systems, tasks and processes that are critical to the operation of the company Identifies personnel responsible for business recovery activities Identifies alternate operations and processing locations Identifies the resources required to continue to effectively function, […]

links all around the globe

You’re Making Your Clients Nervous with Weblinks

In RPost’s prior posts, they discussed common misconceptions about proving email delivery. In the final piece of this three part series on common misconceptions about email delivery, they’ll examine a type of system that some professionals use and mistakenly believe proves fact of e-delivery, a link-retrieval system. Why are you emailing your clients weblinks to documents? They’re not supposed to click on unknown links. It’s making them nervous. Even if you’re using popular apps like dropbox to share files, you can’t be sure your client will trust the link. Nor should they. They might think it’s a phishing scheme. If […]

email received on iPad


In the first part of this series, our partner RPost explained common misconceptions about email security and delivery. In this segment, they will introduce and debunk several other common misconceptions about proving email delivery. How can you prove what really happened behind closed doors? Can we ever know what happened in a meeting behind closed doors, with no recording devices and no third party witnesses? Probably not. Is email a clearer way to communicate a complex message? Not always…. Have you ever been in a situation where an email vanishes? Has your recipient ever claimed not to have received your […]

data protection with key

Pentagon Emails Used in Spoofing Scam

In this three-part series from our partner, RPost, you will learn about the importance of secure e-delivery and ways to safeguard your critical client communications. While a lawyer’s ethical obligation to protect confidential information online has been a concern for some time, the ABA Standing Committee on Ethics and Professional Responsibility has recently issued ABA Formal Opinion 477R, which provides direction regarding when heightened security measures are warranted. According to Foreign Policy, The Pentagon was a recent victim of an email spoofing campaign. Pentagon colleagues, partners and vendors received fake emails that appeared to have been sent from Defense Security […]

Ready to supercharge your law practice?