Attorney Responsiveness – A Super Power

In the midst of finalizing a significant deal for your company, you receive the second round of redlines on the Master Purchase Agreement from your client. Along with some contextual notes, you promptly forward it to your legal counsel.

What happens next? The truth is, whenever legal assistance is enlisted, be it for business or personal matters, prompt communication is eagerly anticipated. A response within 24 hours barely scratches the surface of satisfaction. Whether it’s a pivotal order for your company or the closure on a new home, these occasions come with pressing timelines. Urgency is an integral aspect that contributes to the demanding and relentless nature of the legal profession. Work is typically conducted under time constraints and often without prior scheduling.

Responsiveness

Responsiveness stands out as one of the top characteristics which we all look for in an attorney. Exceptional attorneys strive to strike a balance between their caseload and client correspondence.

In a survey conducted by Thomson Reuters, attorneys were asked, “What do you think makes lawyers, such as yourself, stand out to clients”?

64% of standout lawyers identified service-related factors as key contributors to their standout status. Among these factors, responsiveness emerged as the top service quality cited by attorneys.

Trust

“Speed is the most important component of the customer experience. Two-thirds of customers assert that speed is as important as price, as noted by Ruth Carter, quoting Jay Baer in his book, “The Time to Win.”

Baer further emphasizes that responsiveness fosters trust. “You’ll bolster trust by surpassing your client’s expectations in terms of speed.” This is precisely how a timely response resonates with me. It reassures me that my attorney is diligently looking out for my best interests and comprehends the urgency of the matter.

A good mobile solution with the assets that lawyers use everyday streamlines the process, enabling them to swiftly review documents and provide concise feedback to clients, followed by a comprehensive response.

Facilitating Responsiveness

At Mobile Helix, we specialize in facilitating responsiveness. Our LINK App integrates both Outlook Email and the firm’s Document Management System into a single, encrypted app. Our aim is to simplify and expedite attorneys’ ability to work efficiently from their smartphones and tablets. The fundamental objective behind our work – to help attorneys to better serve their clients.

If you are not familiar with the LINK App’s workflows, including document annotation, I encourage you to take a brief look at LINK in this informative 2-minute video.

-Maureen

Litera: The Legal Tech Juggernaut Takes a Breather

Remember 2021 and 2022? Litera was buying so many companies that at times it was hard to keep track.

In August of 2022, I was at the ILTACON conference at National Harbor, Maryland. Litera had acquired two companies in the previous week, business intelligence company, BigSquare, and talent management software company, Micron Systems. These followed the substantial acquisitions of Foundation Software, Prosperoware, Workshare, and Kira Systems. Per Crunchbase, 15 acquisitions in the past 5 years.

I attended the Litera session, which was in a ballroom. Standing room only. The sense that something special was taking place was palpable. Litera’s new CEO, Sheryl Hoskins, introduced herself, mentioning her active duty in the Army. She was impressive .

Historically at ILTACON the companies with a big presence have been Thomson Reuters, Intapp, iManage, and NetDocuments. But in 2022, Litera had the momentum. They also had the ample pockets of Hg. And Hg was looking for growth.

A lot has changed in the economy in the past six months. The threat of a recession has loomed large. Interest rates are up. Law firms have laid-off associates. Many of the big tech companies have laid-off thousands of people.

From where I stand, legal tech appears to be holding strong. Very few legal tech dedicated companies are public, so we don’t get a quarterly window, or even an annual window, into revenues and profits. However, layoffs in legal tech have been limited thus far. At least two e-discovery companies have had layoffs. On the other hand, Exterro just acquired e-discovery rival Zapproved. Several legal tech firms, including NetDocuments, iManage, Aderant, and Litera are actively hiring.

It makes sense for Litera to take time to work on integrating all of the solutions which it has acquired in the past three years. Keep an eye on Litera. If we manage to have a soft landing, look for Litera and Hg to lead the way again.

-Maureen

At iManage ConnectLive 2022 in Chicago

On October 12th and 13th, iManage held their first in-person ConnectLive conference since 2019. It was at the Willis Tower in iManage’s home town of Chicago. Attendance was very good. Attendees reported that they were very pleased with the content of the sessions. The venue, Convene in the Willis Tower, was wonderful, adding to the friendly ambiance.

Meredith Williams-Range and Neil Araujo at iManage ConnectLive, Oct. 12, 2022

One of my favorite sessions was a fireside chat between Meredith Williams-Range, Chief Knowledge and Client Value Officer at Shearman & Sterling, and Neil Araujo, iManage’s CEO and co-founder. Ms. Williams-Range is a leader in the world of digital knowledge management. In 2018 Williams-Range arrived at Shearman and Sterling, a firm founded in 1873. The firm had one billion documents in locations across the globe, an aged document management system, and very little process around associating files with a Client-Matter and filing to DMS.

They studied the way forward and decided that they would migrate to a cloud-based document management system. This was not a minor decision for a Big Law firm in New York City. Risk averse clients, including those in financial services, have historically been opposed to cloud storage. However, the team worked with their clients to educate them about the change. Ultimately, there was no client resistance. Kudos!

Of course, then COVID hit. Their decision served them well. They were able to migrate to iManage’s Work 10 Cloud during the pandemic. The migration was a success.

For more background on Ms. Williams-Range’s pioneering career and her work at Shearman, I recommend this Profile Magazine spotlight, Meredith Williams-Range Builds the Law Firm of the Future.

To all of the attendees, heavens, it was wonderful to see you again and to show you the latest enhancements in our LINK app. I have to say that the most appreciated new feature in our LINK app was automated check-in after editing.

Here’s what I mean. In our LINK app, check a file out of iManage Work. Edit it in the Word app. Then there is an easy process for the lawyer to check the edited version back into iManage Work. But…if the lawyer does not check the edited version into iManage Work, LINK will automatically check it in. Voila! Lots of love for automatic check-in.

ConnectLive 2023 may be back in NYC. We’ll see you there!

-Maureen

Meet LINK: The Easy Way To Handle All Your Document Workflows On Your Mobile Device In A Single App

By Stephanie Wilkins

From Above the Law, a new product profile on our LINK app.

Here’s an excerpt:

Do Everything, Everywhere With LINK

When you think about the tools you use most in your day-to-day work, your document management system (DMS) and Outlook are probably at the top of the list. Working in both on your mobile device, though, has historically been a huge struggle, if not impossible. LINK brings them together in a single, secure, easy-to-use app.

LINK is designed to support the workflows attorneys use all day, every day. The app works with today’s most popular mobile devices – iPhones, iPads, and Android phones and tablets – and supports the three leading document management systems, iManage Work®, NetDocuments, and eDocs by OpenText.

LINK for Smartphones and Tablets

LINK is solving the pervasive problem of lawyers being unable to adequately work on their mobile devices. With LINK, lawyers can fully access their documents, compare them, mark them up, edit them, email them, and more, as easily and securely as they can on a computer.

Read the full profile here.

Questions? Write to us at: contact at mobilehelix dot com.

-Maureen

The LINK App for Android is here!

Yes! LINK is in production for Android smartphones and tablets.

Now you can use LINK’s workflows including annotation, comparison, and Word app editing with Manage Work® 10 on Android. NetDocuments and eDocs are supported, too! LINK is an encrypted container app therefore your files are separate from device access.

It looks fantastic, if I do say so myself. 🤩

Take a look at this brief video to see the LINK App’s easy workflows with DMS, Outlook, and web resources.🔽

LINK App for Android Video – 3 minutes

Let me know if you want to see a demo or to do a trial including Android, iOS, and iPadOS

-Maureen write to: contact at mobilehelix dot com

What is the LINK App? Find out in 112 seconds.

In this short video, view the major features of our encrypted LINK app.

LINK is integrated with iManage, NetDocuments, and eDocs DMS as well as Outlook and SharePoint. LINK enables essential workflows in a single app. Review, annotate, compare, and email files. Edit securely with the Word App.

Want to learn more? Email us at: contact at mobilehelix dot com.

-Maureen

Get the Most from iManage Work® on Tablets and Smartphones with LINK

Our “baby,” the LINK App, is a full-fledged teenager now, growing by leaps and bounds and taking the car out for a spin.

If you have not seen LINK in the past 12 months, you’ll find this demo video an eye-opener. Split-screen mode and multi-tabbed view are a fantastically productive way to work on tablets. You work in several lives screens.

This new demo video is a quick way to see some of LINK’s best workflows. Use the timeline to go directly to the feature which you want to see. Let us know what you think. To schedule a demo, write to us: [email protected].

0:00 – Authentication
0:34 – LINK Home Screen
1:42 – SharePoint / Portal / Web Resources
2:15 – My Files in LINK
3:11 – Navigate in iManage Work
3:22 – Split-screen Mode & Multi-tab View
5:57 – Search iManage
7:30 – Quick Lookup – Client/Matter & Doc ID
8:42 – List All Files
9:36 – PDF Viewer Features
11:02 – Annotation
12:25 – Check-in to iManage
13:20 – Email a File from iManage
15:15 – Edit with the Word App
17:15 – Check-in to iManage
18:20 – Compare Edited Version
19:00 – Inbox: Search, Sort, Filter
19:28 – Open an NRL, Annotate, & Email
20:13 – Predictive & Multiple Filing to Outlook and iManage Folders
22:25 – Compose an Email, Attach a File in iManage, Send & File

Our next ILTA webinar is: “Email Management Integrated with DMS in the LINK App” on October 20th. You’ll see LINK’s email usability features as well as predictive filing to Outlook and DMS folders. Learn more and register HERE.

-Maureen

REvil has struck again. What can we do? Design for explicit access.

At a glance… 

  • Kaseya VSA is used by IT organizations and many Managed Service Providers (MSPs) to track IT assets and to deliver software installations and patches to a network of endpoint nodes.  
  • Over the 4th of July weekend, a ransomware attack perpetrated by the REvil gang and its affiliates was delivered through the Kaseya VSA remote management software.  
  • Each Windows node on the network runs a Kaseya agent, which is responsible for downloading and installing patches and software packages from the VSA server. It is common practice for an MSP to use a single VSA server to manage all of the MSP’s client networks, meaning that one compromised VSA server can create a downstream impact on hundreds of individual businesses. 
  • 1,500 businesses may be effected. 

The fascinating anatomy of the hack 

REvil’s successful hack began with an SQL injection attack against the VSA server. The attacked VSA servers were exposed to the Internet, presumably to allow for remote access to the VSA server by an MSP’s employees. An SQL injection attack was crafted by the hackers to (a) bypass authentication, (b) upload a file, and (c) inject a command to distribute a malicious software patch. This software patch was then dutifully downloaded by Kaseya agents installed on Windows endpoints attached to the compromised VSA server. The technical details of how this was accomplished are explained quite clearly in this article by Sophos

The hack itself is fascinating from a technical perspective in multiple ways. First, an authentication bypass renders an entire stack of security technology (authentication providers and MFA) entirely irrelevant. There is no password guessing or credential stealing involved in this attack. Second, the MSP model where client networks are intermingled in a single VSA instance is inherently dangerous in that a single compromised server (whether it be a via a 0-day exploit or a more traditional stolen credential) can spread malicious software across many disparate organizations, geographies, and networks. Third, it is perturbing that a piece of software like the VSA server was directly exposed to the Internet. The lack of any intervening, independent authentication (e.g., a VPN or IIS authentication using certificates or Kerberos) places an inordinate amount of trust in the security architecture of a single piece of software (the VSA server). 

In general, the best way to mitigate hacks of all varieties is to apply a few principles: 

  1. Keep independent networks as separate as possible, and always require authentication to move between them. 
  1. Authenticate users and devices in layers that rely on disparate software stacks. Software is built by humans, and humans make mistakes that cause security vulnerabilities. Using independent software stacks to layer together multiple forms of authentication ensures that a hacker has to find multiple, independent mistakes that are exploitable in conjunction. 
  1. Because there is still no perfect way to prevent endpoint attacks from happening, effective endpoint protection is essential. The Kaseya exploit relied on anti-virus exceptions on the endpoint to allow a malicious file to be downloaded, decoded into an executable, and run via a shell command. This malicious executable then executed a side loading attack to actually launch the encryption process. Effective anomaly detection could have shut down the encrypting process before it got too far, and an alternative approach to using an anti-virus exception would have stopped the attack when it tried to execute the downloaded executable. 

A collective reconsideration of how we protect networks and endpoints is overdue 

This latest attack from REvil confirms the obvious – the business of ransomware is here to stay. Whether it is REvil, a spinoff from REvil, or an entirely new organization that is inspired by REvil’s success, a collective reconsideration of how we protect networks and endpoints is overdue. It has become standard practice to disable security software in order to enable functionality, rather than demanding the opposite – that software declare its intended behaviors in order to enable security software to detect anomalous behavior. 

A system of specific access vs. access to the entire network 

Our LINK system is architected with this last principle in mind. Rather than assume that all mobile devices need access to the company network (e.g., via VPN), LINK assumes that only a small number of applications and data repositories should be mobilized. To configure LINK, IT specifies exactly what intranet applications, email servers, and file repositories (Document Management Systems, One Drive, SMB shares, etc.) should be accessible from a mobile device, and this specification is role-based so that IT can take a pessimistic approach to mobile access (i.e., you can’t access anything unless permission is explicitly granted to you). LINK also uses multiple, independent layers of authentication – SSL certificates to authenticate the device, then traditional password-based authentication if the SSL authentication succeeds. Finally, each LINK installation acts as its own certificate authority for the purposes of SSL authentication. Hence, stealing a certificate for one installation does not grant access to any other installations. 

As we expand LINK beyond mobile, our goal is to promote a different approach to endpoint computing. This approach starts with the idea that users, applications and data need to be integrated explicitly, rather than implicitly. This creates a work environment that is easily encapsulated, encrypted, and protected with limited entry points and exit points to move data in and out of this environment. While no approach is perfect, the more explicit we are about how users, applications, and data interact, the better chance we have to stop the ransomware business before it expands any further. 

-Seth Hallem, CEO & Co-founder, Mobile Helix

Productivity Boost: Compare Word Files in the LINK App

Did you know that in our LINK App you can compare Word files?

  • Compare two files
  • Compare two versions of a file
  • Compare an attachment in email to a file in DMS

Watch this 16 second video to view comparing two versions of a file in iManage Work in the LINK App.

LINK has the compareDocs engine from DocsCorp built-in for high fidelity comparison results within the LINK secure container.

LINK is integrated with iManage Work®, NetDocuments DMS, OpenText eDocs, and Outlook email. In a single app, compare your files, then email or check-in to DMS.

Watch this video to see full workflows using in-app comparison and using the Word app for editing.

If have any questions, write to us at: contact at mobilehelix dot com. We’d be happy to answer your questions.

-Maureen

Word App Editing Just Got Easier for Lawyers with LINK

We have developed several editing workflows using the Word app over the years. Our newest one is the easiest one which we have seen anywhere. This is in part because our LINK app securely integrates your Document Management System and Email with the Word app. Therefore, you can choose to edit a file from DMS or an email attachment and it will open directly in Word.

Take a look at our 2 minute, 44 second video to see this workflow.

Here’s what you don’t have to do in our workflow:

  1. No need to copy the file in the Word app. LINK encrypts the file and moves it to Word.
  2. No need to save the file as .docx in the Word file. LINK converts .doc to .docx for you.
  3. No need to delete the file from the Word app after editing. LINK deletes it.

This video shows how straightforward it is to edit from LINK with the Word app.

LINK is integrated with iManage Work® 10, on-prem and in the Cloud; NetDocuments DMS; OneDrive; Network File Shares; and OpenText eDocs is in development. LINK is also integrated with Microsoft Exchange, therefore, you have your Outlook Email, Contacts, Calendar, Tasks, and Notes within the LINK App.

If your attorneys are looking for a simple way to edit files in DMS or in Outlook email with the Word app, email me. We are happy to show you a demo of this workflow.

-Maureen

contact @ mobilehelix dot com