A Tech Support Manual for Problems with People Part 1

Law Technology Today, April 23, 2014 – by

Most of us have frustrating challenges with technology from time to time.

At least you can usually call tech support, an IT specialist or a trainer, and the problem eventually gets resolved. But what do you do when the frustrations that bring you to a boiling point stem from people problems? You probably don’t have a 24/7 support number to call.

In this three-part series, I’ll give you a few tools to add to your communication and management toolbox for troubling situations with other people.

The first tool: Monitor your own attitude.

As lawyers, we have honed our skills at identifying what might go wrong and designing protections against that.  When something does go wrong, we’re skilled at building a good argument for assigning blame, and finding the fallacy in anyone else’s argument. We’re predisposed to use those skills that we have developed so diligently. Unfortunately, those time-tested legal strategies don’t work so well for developing and maintaining important relationships or eliciting cooperation and collaboration from other people. <READ MORE>

Stolen laptops mean $2M in mega fines

Healthcare IT News – Mike Miliard, Managing Editor, WASHINGTON | April 23, 2014

Serving notice that “covered entities and business associates must understand that mobile device security is their obligation,” the HHS Office for Civil Rights has settled with two organizations for a combined $1,975,220 penalty after their unencrypted computers were stolen.

[See also: Why does healthcare resist encryption? ]

That’s a big number. And that’s because it’s meant to drive home the point that unencrypted laptops and mobile devices pose significant risks to the security of patient information, said Susan McAndrew, OCR’s deputy director of health information privacy.

“Our message to these organizations is simple: Encryption is your best defense against these incidents,” she said.

[See also: OCR: 'Pay attention to details']

The biggest of the two settlements was levied against Concentra Health Services, after OCR opened an investigation following a breach report that an unencrypted laptop was stolen from one of its facilities, the Springfield Missouri Physical Therapy Center.

The probe found that Concentra had previously recognized, in multiple risk analyses, that a lack of encryption on its laptops, desktop computers, medical equipment, tablets and other devices containing electronic protected health information was a critical risk. <READ MORE>

 

Law firm wake up call?

PinHawk Blog – Posted by on April 21, 2014

Vol. 3, No. 77

If you’ve been paying attention, you know the news about law firms hasn’t been all that good of late – in terms of reductions in force. I find it a bit frustrating because it is law firms responding as they have done in the past – terminating personnel – instead of doing what they need to do to reinvent themselves, and, as a result, attract more business.

While I realize that it is a necessity to cut expenses in the face of possible failure (and it may be that this is just some firms who haven’t done what they need to do to survive in this business climate), I hope this serves as a wake up call to those firms who aren’t in trouble yet.

If it isn’t too late, the blog posts from Ron Friedmann and Bruce McEwen will be of use as they outline the problems and a way to get moving on the solution.

Building a Successful Social Media Campaign

Intuit Small Business Blog, by Carla Turchetti on April 15, 2014

As an entrepreneur, you know all about the  power of social  media: It can help you build your brand, promote your business, and  connect with customers. But  before you write your next post or tweet, consider whether your current  strategies are making efficient use of your time and resonating with your  market.

Your venture needs a social media plan as much as it needs a business plan. Any successful social media campaign begins  with a goal in mind and an awareness of which platforms are engaging your target  audience. Your approach doesn’t have to be complicated. Putting the right  messages in the right places should reach the right people.

Getting Started

“It always starts with [answering the questions]: What are you trying to  achieve? And what are your business goals and objectives?” says Kevin Bobowski,  vice president of marketing at Offerpop,  which provides digital tools for launching and analyzing social media  campaigns. “The other thing is: Who are you trying to reach? Is it existing  customers, is it prospects, or is it people you’ve never heard of?”

Answering these questions is a relatively simple undertaking for most  small-business owners, because they are so involved in every aspect of the  company, he says. Once you have determined your target audience and objectives,  you’ll find it easier to design a social media campaign that will yield the  desired results. <READ MORE>

Google Admits that It Reads your Emails

From: The Hacker News, Tuesday, April 15, 2014 by

Google has updated its privacy terms and conditions on Monday to offer more transparency regarding its email-scanning practices. One of the world’s biggest Web internet giant, Google, made it clear that the information its users submit and share with its systems is all analyzed.

Last year, Google was accused of its illegal interception of all electronic communications sent to Gmail account holders and using the gathering data to sell and place advertisements in order to serve related ads to its users. Practically, the more information you let Google collect about you, the more accurate its adverts become. <READ MORE>

Information Chaos

PinHawk Blog, Legal Administrator Daily, Posted by on April 14, 2014

The Association for Image and Information Management – better known as AIIM held their annual conference a few weeks ago. If you are unfamiliar with AIIM, I urge you to spend a few minutes on their home-page to learn about a wealth of resources related to ‘information management’. Its all there!

Information Management has everything to do with how well your firm operates. The topic is so much more than records policy or a good document management system. Information management requires coordination, creativity, a plan, senior level sponsorship – and much more. The results can have a profound impact on costs, risks, and client service.

AIIM has made the keynote presentation from their annual conference – by AIIM President John Mancini – available here. I urge you to view the 28 slides, and download the whitepaper made available through a link on the last slide. The whitepaper includes specific steps to take around areas like the ..’Risk of growing volumes of content‘ (my favorite – #4 ‘Ensure that new staff and existing staff are fully trained on compliance with the policy.’), how to..’Transform our content-intensive business processes (my favorite – #16 ‘A great place to start is with these processes: HR, accounts payable, and customer correspondence’), and ‘How do we get business INSIGHT out of all the information we are gathering’.

Related Posts – News for Legal Administrators

Facebook Reaches Out to Small-Business Owners

Intuit Small Business Blog, by Carla Turchetti on April 14, 2014

In an effort to learn more about how its social network fuels business  success, Facebook is reaching out to expert entrepreneurs through its newly formed Small  and Medium Business Council. The council convened for the first time in  March at the company’s headquarters in Menlo Park, Calif., reports David Cohen,  editor of the AllFacebook blog.

Eighteen entrepreneurs from 12 businesses make up the council, which is  designed to be a give-and-take between the world’s largest social  media network and representatives of the millions of business owners who  actively use it to reach customers.

“It is a wonderful opportunity,” council member Kay Martinovic, owner of Kay’s Designer Consignment in Ormond Beach, Fla., tells the  Intuit Small Business Blog. “This avenue that we have now not only deals  with Facebook’s  small- to medium-size business team directly, but also with other members of the  council. It is a great group of fantastically imaginative, creative people, and  the ideas that are bounced back and forth are very exciting.” <READ MORE>

Don’t waste your money trying to upgrade your Windows XP PC

PC World Insights, by Tony , Apr 7, 2014

With the end of Windows XP support from Microsoft imminent, perhaps you’ve finally made the (very wise) decision to stop using the vulnerable operating system. I commend you. However, if you’re planning to simply install a newer operating system on your existing hardware, you should reconsider.

Sure, there’s a good chance that your existing hardware meets the minimum system requirements for either OS: a 1GHz or faster processor, 1GB of RAM (2GB for 64-bit), 16GB of hard drive space (20GB for 64-bit) and a DirectX 9 graphics device with WDDM 1.0 or higher.

But although Windows 7 or Windows 8 will technically run on a system like this,  it will do so in that way that causes you to frequently threaten your PC and spew profanity laced insults at Microsoft. For either of those operating systems to run moderately well, you need at least a dual-core CPU and 4GB of RAM. And Windows itself may only need 20GB of hard drive storage, but it’s easy to fill 500GB or more with applications, photos, videos, and other content. <READ MORE>

Heartbleed – OpenSSL Zero-day Bug leaves Millions of websites Vulnerable

From – The Hacker News, Tuesday, April 08, 2014 by

It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible.

As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.

The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.

OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL. <READ MORE>

Free Microsoft Windows for the Internet of Things and Mobile Devices

The Hacker New Blog, Sunday, April 06, 2014 by

Tomorrow, 8th April could be a sad day for all those who are still using Windows XP, as it is an official assassination day of it, but there is also a good news that Microsoft is going to stop charging for its Windows Operating System on the devices with screens smaller than nine inches.

Yes, Free a Windows OS for the Internet of Things (IoTs)such as Mobile Devices, Smart thermostats, Smart TVs, wearable devices etc., that was announced by Microsoft at Build 2014 conference on Wednesday.

To accelerate the creation of great mobile devices running Windows and grow our number of users, we announced today that Windows will be available for $0 to hardware partners for Windows Phones and tablets smaller than 9” in size,” said Terry Myerson, executive vice president, OS Group at Microsoft and he also added that it will include a one-year subscription to Office 365. <READ MORE>