Attorney Responsiveness – A Super Power

In the midst of finalizing a significant deal for your company, you receive the second round of redlines on the Master Purchase Agreement from your client. Along with some contextual notes, you promptly forward it to your legal counsel.

What happens next? The truth is, whenever legal assistance is enlisted, be it for business or personal matters, prompt communication is eagerly anticipated. A response within 24 hours barely scratches the surface of satisfaction. Whether it’s a pivotal order for your company or the closure on a new home, these occasions come with pressing timelines. Urgency is an integral aspect that contributes to the demanding and relentless nature of the legal profession. Work is typically conducted under time constraints and often without prior scheduling.

Responsiveness

Responsiveness stands out as one of the top characteristics which we all look for in an attorney. Exceptional attorneys strive to strike a balance between their caseload and client correspondence.

In a survey conducted by Thomson Reuters, attorneys were asked, “What do you think makes lawyers, such as yourself, stand out to clients”?

64% of standout lawyers identified service-related factors as key contributors to their standout status. Among these factors, responsiveness emerged as the top service quality cited by attorneys.

Trust

“Speed is the most important component of the customer experience. Two-thirds of customers assert that speed is as important as price, as noted by Ruth Carter, quoting Jay Baer in his book, “The Time to Win.”

Baer further emphasizes that responsiveness fosters trust. “You’ll bolster trust by surpassing your client’s expectations in terms of speed.” This is precisely how a timely response resonates with me. It reassures me that my attorney is diligently looking out for my best interests and comprehends the urgency of the matter.

A good mobile solution with the assets that lawyers use everyday streamlines the process, enabling them to swiftly review documents and provide concise feedback to clients, followed by a comprehensive response.

Facilitating Responsiveness

At Mobile Helix, we specialize in facilitating responsiveness. Our LINK App integrates both Outlook Email and the firm’s Document Management System into a single, encrypted app. Our aim is to simplify and expedite attorneys’ ability to work efficiently from their smartphones and tablets. The fundamental objective behind our work – to help attorneys to better serve their clients.

If you are not familiar with the LINK App’s workflows, including document annotation, I encourage you to take a brief look at LINK in this informative 2-minute video.

-Maureen

Litera: The Legal Tech Juggernaut Takes a Breather

Remember 2021 and 2022? Litera was buying so many companies that at times it was hard to keep track.

In August of 2022, I was at the ILTACON conference at National Harbor, Maryland. Litera had acquired two companies in the previous week, business intelligence company, BigSquare, and talent management software company, Micron Systems. These followed the substantial acquisitions of Foundation Software, Prosperoware, Workshare, and Kira Systems. Per Crunchbase, 15 acquisitions in the past 5 years.

I attended the Litera session, which was in a ballroom. Standing room only. The sense that something special was taking place was palpable. Litera’s new CEO, Sheryl Hoskins, introduced herself, mentioning her active duty in the Army. She was impressive .

Historically at ILTACON the companies with a big presence have been Thomson Reuters, Intapp, iManage, and NetDocuments. But in 2022, Litera had the momentum. They also had the ample pockets of Hg. And Hg was looking for growth.

A lot has changed in the economy in the past six months. The threat of a recession has loomed large. Interest rates are up. Law firms have laid-off associates. Many of the big tech companies have laid-off thousands of people.

From where I stand, legal tech appears to be holding strong. Very few legal tech dedicated companies are public, so we don’t get a quarterly window, or even an annual window, into revenues and profits. However, layoffs in legal tech have been limited thus far. At least two e-discovery companies have had layoffs. On the other hand, Exterro just acquired e-discovery rival Zapproved. Several legal tech firms, including NetDocuments, iManage, Aderant, and Litera are actively hiring.

It makes sense for Litera to take time to work on integrating all of the solutions which it has acquired in the past three years. Keep an eye on Litera. If we manage to have a soft landing, look for Litera and Hg to lead the way again.

-Maureen

The LINK App for Android is here!

Yes! LINK is in production for Android smartphones and tablets.

Now you can use LINK’s workflows including annotation, comparison, and Word app editing with Manage Work® 10 on Android. NetDocuments and eDocs are supported, too! LINK is an encrypted container app therefore your files are separate from device access.

It looks fantastic, if I do say so myself. 🤩

Take a look at this brief video to see the LINK App’s easy workflows with DMS, Outlook, and web resources.🔽

LINK App for Android Video – 3 minutes

Let me know if you want to see a demo or to do a trial including Android, iOS, and iPadOS

-Maureen write to: contact at mobilehelix dot com

What is the LINK App? Find out in 112 seconds.

In this short video, view the major features of our encrypted LINK app.

LINK is integrated with iManage, NetDocuments, and eDocs DMS as well as Outlook and SharePoint. LINK enables essential workflows in a single app. Review, annotate, compare, and email files. Edit securely with the Word App.

Want to learn more? Email us at: contact at mobilehelix dot com.

-Maureen

REvil has struck again. What can we do? Design for explicit access.

At a glance… 

  • Kaseya VSA is used by IT organizations and many Managed Service Providers (MSPs) to track IT assets and to deliver software installations and patches to a network of endpoint nodes.  
  • Over the 4th of July weekend, a ransomware attack perpetrated by the REvil gang and its affiliates was delivered through the Kaseya VSA remote management software.  
  • Each Windows node on the network runs a Kaseya agent, which is responsible for downloading and installing patches and software packages from the VSA server. It is common practice for an MSP to use a single VSA server to manage all of the MSP’s client networks, meaning that one compromised VSA server can create a downstream impact on hundreds of individual businesses. 
  • 1,500 businesses may be effected. 

The fascinating anatomy of the hack 

REvil’s successful hack began with an SQL injection attack against the VSA server. The attacked VSA servers were exposed to the Internet, presumably to allow for remote access to the VSA server by an MSP’s employees. An SQL injection attack was crafted by the hackers to (a) bypass authentication, (b) upload a file, and (c) inject a command to distribute a malicious software patch. This software patch was then dutifully downloaded by Kaseya agents installed on Windows endpoints attached to the compromised VSA server. The technical details of how this was accomplished are explained quite clearly in this article by Sophos

The hack itself is fascinating from a technical perspective in multiple ways. First, an authentication bypass renders an entire stack of security technology (authentication providers and MFA) entirely irrelevant. There is no password guessing or credential stealing involved in this attack. Second, the MSP model where client networks are intermingled in a single VSA instance is inherently dangerous in that a single compromised server (whether it be a via a 0-day exploit or a more traditional stolen credential) can spread malicious software across many disparate organizations, geographies, and networks. Third, it is perturbing that a piece of software like the VSA server was directly exposed to the Internet. The lack of any intervening, independent authentication (e.g., a VPN or IIS authentication using certificates or Kerberos) places an inordinate amount of trust in the security architecture of a single piece of software (the VSA server). 

In general, the best way to mitigate hacks of all varieties is to apply a few principles: 

  1. Keep independent networks as separate as possible, and always require authentication to move between them. 
  1. Authenticate users and devices in layers that rely on disparate software stacks. Software is built by humans, and humans make mistakes that cause security vulnerabilities. Using independent software stacks to layer together multiple forms of authentication ensures that a hacker has to find multiple, independent mistakes that are exploitable in conjunction. 
  1. Because there is still no perfect way to prevent endpoint attacks from happening, effective endpoint protection is essential. The Kaseya exploit relied on anti-virus exceptions on the endpoint to allow a malicious file to be downloaded, decoded into an executable, and run via a shell command. This malicious executable then executed a side loading attack to actually launch the encryption process. Effective anomaly detection could have shut down the encrypting process before it got too far, and an alternative approach to using an anti-virus exception would have stopped the attack when it tried to execute the downloaded executable. 

A collective reconsideration of how we protect networks and endpoints is overdue 

This latest attack from REvil confirms the obvious – the business of ransomware is here to stay. Whether it is REvil, a spinoff from REvil, or an entirely new organization that is inspired by REvil’s success, a collective reconsideration of how we protect networks and endpoints is overdue. It has become standard practice to disable security software in order to enable functionality, rather than demanding the opposite – that software declare its intended behaviors in order to enable security software to detect anomalous behavior. 

A system of specific access vs. access to the entire network 

Our LINK system is architected with this last principle in mind. Rather than assume that all mobile devices need access to the company network (e.g., via VPN), LINK assumes that only a small number of applications and data repositories should be mobilized. To configure LINK, IT specifies exactly what intranet applications, email servers, and file repositories (Document Management Systems, One Drive, SMB shares, etc.) should be accessible from a mobile device, and this specification is role-based so that IT can take a pessimistic approach to mobile access (i.e., you can’t access anything unless permission is explicitly granted to you). LINK also uses multiple, independent layers of authentication – SSL certificates to authenticate the device, then traditional password-based authentication if the SSL authentication succeeds. Finally, each LINK installation acts as its own certificate authority for the purposes of SSL authentication. Hence, stealing a certificate for one installation does not grant access to any other installations. 

As we expand LINK beyond mobile, our goal is to promote a different approach to endpoint computing. This approach starts with the idea that users, applications and data need to be integrated explicitly, rather than implicitly. This creates a work environment that is easily encapsulated, encrypted, and protected with limited entry points and exit points to move data in and out of this environment. While no approach is perfect, the more explicit we are about how users, applications, and data interact, the better chance we have to stop the ransomware business before it expands any further. 

-Seth Hallem, CEO & Co-founder, Mobile Helix

Productivity Boost: Compare Word Files in the LINK App

Did you know that in our LINK App you can compare Word files?

  • Compare two files
  • Compare two versions of a file
  • Compare an attachment in email to a file in DMS

Watch this 16 second video to view comparing two versions of a file in iManage Work in the LINK App.

LINK has the compareDocs engine from DocsCorp built-in for high fidelity comparison results within the LINK secure container.

LINK is integrated with iManage Work®, NetDocuments DMS, OpenText eDocs, and Outlook email. In a single app, compare your files, then email or check-in to DMS.

Watch this video to see full workflows using in-app comparison and using the Word app for editing.

If have any questions, write to us at: contact at mobilehelix dot com. We’d be happy to answer your questions.

-Maureen

Word App Editing Just Got Easier for Lawyers with LINK

We have developed several editing workflows using the Word app over the years. Our newest one is the easiest one which we have seen anywhere. This is in part because our LINK app securely integrates your Document Management System and Email with the Word app. Therefore, you can choose to edit a file from DMS or an email attachment and it will open directly in Word.

Take a look at our 2 minute, 44 second video to see this workflow.

Here’s what you don’t have to do in our workflow:

  1. No need to copy the file in the Word app. LINK encrypts the file and moves it to Word.
  2. No need to save the file as .docx in the Word file. LINK converts .doc to .docx for you.
  3. No need to delete the file from the Word app after editing. LINK deletes it.

This video shows how straightforward it is to edit from LINK with the Word app.

LINK is integrated with iManage Work® 10, on-prem and in the Cloud; NetDocuments DMS; OneDrive; Network File Shares; and OpenText eDocs is in development. LINK is also integrated with Microsoft Exchange, therefore, you have your Outlook Email, Contacts, Calendar, Tasks, and Notes within the LINK App.

If your attorneys are looking for a simple way to edit files in DMS or in Outlook email with the Word app, email me. We are happy to show you a demo of this workflow.

-Maureen

contact @ mobilehelix dot com

LINK App: New – List All Files

Here is another fantastic feature request from a LINK user.

Sometimes you need a list of every file in a folder or even in a Workspace in iManage Work or NetDocuments DMS. Search may not help as you don’t know exactly what you are looking for. Now in LINK you can create the list, annotate it, then Air Print, email, import to iManage or NetDocuments, or save in LINK to My Files.

To create the list, tap the ellipsis icon to the right of any folder or Workspace. Tap “List All Files.”

The list is displayed.

To annotate, tap the Paper & Pencil icon and mark away.

After annotating, you can use the icons in the lower right to Air Print, email, import to iManage, or save in LINK to My Files. Or, tap the X in the upper left to get a succinct menu with options to import, email, or save to My Files.

Don’t you love it? 🙂

-Maureen

LINK App: Send-and-File to DMS

We are receiving more and more requests to Send-and-File to iManage and NetDocuments. Our LINK app has done this for years.

Filing email to DMS is becoming important from a governance perspective. Not only do law firms want emails to be accessible in DMS with the Matter. But some law firms want to reduce the risk of years of email in Outlook. One of our law firm customers deletes all email at the 90-day mark. Truly. Another firm archives all email after 90 days. Retrieving email from the archive is possible but time-consuming. Therefore, filing to DMS becomes more attractive to attorneys.

Even without such law firm email policies, filing email to the Matter is increasing. The key is that is filing to DMS needs to be easy.

But Send-and-File on mobile devices is rare. It requires a tight integration of DMS and Email, as well as comprehensive security to protect confidential client data. LINK provides both the easy workflow and the security. Draft the email, tap Send, then tap a Recommended, Recent, or DMS folder to file.

LINK has predictive filing, too. LINK learns where you file a certain correspondent’s email and will show you Recommended, Recent, and DMS folders. In many cases you can file to one of these folders with a single tap.

New in LINK, the attorney can now go to the LINK email settings to turn Send-and-File on or off by default. The attorney can also toggle Send-and-File off and on, per individual email by tapping the envelope icon in draft email. When the envelope is green, Send-and-File is on.

Send and File Setting in LINK

Watch this brief video to see all of LINK’s Send-and-File features.

If you have questions, just write to us at: contact at mobilehelix.com. We’re ready to help you.

Learn more about LINK’s encryption, authentication, and secure container in this 5-minute video: LINK’s Security and Data Protection.

-Maureen

LINK App: Add to Favorites & My Matters

New in LINK and by popular demand, you can now:

  1. Add a workspace, folder, or file to Favorites
  2. Add a a workspace to My Matters
My Matters & Favorites Image

Just tap the ellipsis menu to the right of the workspace, folder, or file name.

This 36 second video shows how quick it is to do so.

If you have questions, email us at: contact @ mobilehelix dot com.

-Maureen

Register for our ILTA Webinar on July 20th: Paperless? It’s Easy with the LINK App