Suite Side Blog Header
Two IT professionals looking at computer screens with coding on them
Law Firm Operations
The Human Side of SOC 2: It’s About More Than Just Technology
All organizations – particularly those that outsource crucial business operations to third-party technology businesses and SaaS companies – must ensure that their data is handled properly, protecting customers from data theft, extortion, and malware attacks. Service Organization Control 2 (SOC 2) provides a framework to help stakeholders ensure that vendors protect the interests of the company they serve and the personal data of vulnerable clients.
Read More
IT worker working on a computer
Law Firm Operations
Are Your Software Providers SOC 2 Compliant? They Should Be.
With cybersecurity threats on the rise, it is imperative that firms proactively improve internal and external security protocols. Keeping confidential information and sensitive client data secure means extending such protocols to each software vendor. It’s important to check the data security protocols of the software you’re evaluating before you make any decisions that can have a long-lasting impact on your firm.
Read More

Man sitting at a laptop and computer screen with coding on them
Law Firm Operations
Two Heads are Better Than One: Working with your IT Company When Transitioning to A New Practice Management Platform
With so much technology at our fingertips, IT professionals always have some sort of new technological advancement to tackle. Any time you undertake a project that involves your computers, it is a good idea to have your IT team involved. Involving them early in the project can help to make the project proceed more smoothly.…
Read More
IT worker coding at a computer
Law Firm Operations
Cybersecurity Threats Are Looming: Is Your Firm Prepared?
It’s becoming more and more difficult to stay current with all the cybersecurity threats that individuals and businesses face. The “bad guys” are focusing not only on accessing data, but they are continually sending emails, texts and phone calls. They are targeting smaller business entities with the assumption that these businesses do not have the appropriate protection in place. As more people continue to work remotely, it is becoming increasingly important that everyone understand why security is critical and what is at risk. We all understand the importance of locking the doors to our homes and apartments as well as our automobiles. Cybersecurity is just as important, and in many cases, cyberattacks can be more detrimental than experiencing a home or auto being vandalized. Let’s review some of these cyber threats and ways to protect your firm from them.
Read More

Group of people discussing their disaster plan
Matter Management
A Few More Important Things About Preparing for a Disaster
Our first discussion about disasters covered types of disasters and some basics needed to properly address a disruption in normal activities, including how to build a robust team. We subsequently outlined how to make use of staging areas, alternative facilities, and working from home in the second article.
Read More
Team members working together in an office
Law Firm Operations
More to Know About Preparing for a Disaster
Our first discussion about disasters addressed several types of disasters and some basics needed to properly address disruption in normal activities. Please reference part one to learn more about disaster types and how to build a robust team.
Read More

woman typing on her computer at her kitchen table
Updates from Zola
Is your practice ready to embrace a work from home program?
A work-from-home policy presents many benefits and drawbacks for a modern law firm. With a virtual law office, your firm will save on monthly rent costs and is likely to experience less employee turnover. However, remotely participating in meetings with clients and employees can be challenging when employees must rely on technology alone for critical communication. Luckily, there are affordable technologies available that will alleviate some of these challenges.
Read More
links all around the globe
Law Firm Operations
You're Making Your Clients Nervous with Weblinks
Why are you emailing your clients weblinks to documents? They’re not supposed to click on unknown links. It’s making them nervous. Even if you’re using popular apps like dropbox to share files, you can’t be sure your client will trust the link. Nor should they. They might think it’s a phishing scheme. If you’re using a link retrieval system to “prove” that documents were received by your clients for compliance reasons, you may want to rethink this….
Read More

email received on iPad
Law Firm Operations
PROVE IT!
How can you prove what really happened behind closed doors? Can we ever know what happened in a meeting behind closed doors, with no recording devices and no third party witnesses? Probably not. Is email a clearer way to communicate a complex message? Not always….
Read More

Ready to supercharge your law practice?

X
Join us for our upcoming webinar, Delivering More Value to Clients with Zola’s Caseway Portal