Law firms have continued to embrace and implement change at a faster rate over the last five to seven years. The reasons? Security, data privacy and ethics. In this article published by ILTA, Kenny Leckie addresses what is it about security, data privacy and ethics that matters to law firm decision makers, and why these things are driving big changes in legal.
How are you going to ensure you have your best possible ILTACON experience? For Traveling Coaches, our path to success goes far beyond our booth (#500 BTW) to a multitude of other ways for us to connect with peers. Check out our tips for attendees, along with what TC has in store!
Collaboration technology has been around for a long time. Legal, however, has been a bit slow to embrace it, leaving many to ask whether their use is myth or reality. In this article published by ALA, Kenny Leckie makes collaboration tools in legal a myth no more, discussing security and ethical considerations, enterprise vs. consumer tools, and popular types of tools to use.
Has your firm just implemented a matter-centric document management system (DMS)? Frontline support can expect most questions to involve how to find content. It all starts with asking "What's the matter?"
Cloud, cloud, cloud — it’s hard to go a day without hearing about it. Let’s think this “cloud thing” all the way through by taking a high-level look at the following questions: What is it? Is it safe? What are the benefits? What are the risks? Why should I care?
Mastery of leadership requires the ability to identify, understand and inhabit the correct form of leadership that a situation requires. Volunteering gives women an amazing opportunity to flex and develop these skills. Hear what Gina Buser and a panel of women leaders had to say about embracing the opportunity to grow through volunteering, while retaining your integrity and dignity and growing your leadership strength and presence.
In this episode of our podcast A Change Ahead, two Traveling Coaches consultants, Kenny Leckie and Kevin Patterson, talk about the ways IT, support staff and technology enthusiasts can utilize sandboxing: an upcoming feature in the new version of Windows. Learn how sandboxing can be used to safely test things directly from your computer without worrying about affecting your computer.
The world today is data-driven, and everywhere you turn you’re reminded that you need to be utilizing data to build your business case, to evaluate your options, to make decisions. People make it sound so easy! But if it isn’t a part of your daily routine already, where do you begin? It’s as simple as going back to the lessons of your youth when you first learned about the scientific method.
What happens if someone on the frontline support team doesn’t know an answer or mistakenly gives the wrong answer? What if no one follows up with a customer about their issue? The entire IT team can be immediately discredited. Here are some tips to ensure your frontline support team is set up for success for your next big rollout.
There’s a lot of talk about “design thinking,” but if you’re a trainer and not an instructional designer, you might think "so what"? Using science and psychology to understand how design touches and influences each of us daily can increase your success in the training room. Did you miss our webinar on this topic? Here’s the recording!
What is the value of your learning programs? I’m talking about onboarding, security awareness, technology training, professional development — all of it. Transform your learning programs from those made for “develop and deliver” to those that drive performance, solve a problem, increase adoption or increase efficiency. Accomplish this by establishing metrics that matter.
A big Silicon Valley law firm wants to teach old lawyers new tech tricks and is willing to pay big bucks for it! What tech adoption tip would earn you that prize? See what eight experts have to say about persuading lawyers and law firms to embrace technological change.
Are your programs enabling performance? Are you making decisions based on data? Are you engaging with your customer to ensure you are meeting their needs? We, learning professionals, own the effort. Training is not a spectator sport.
Microsoft is providing a way for developers, and interested users, to test their applications or software in a Windows Sandbox (previously referred to as “InPrivate Desktop”). Find out why I’m digging this new sandbox!
In the first episode of our podcast A Change Ahead, Carolyn Humpherys, Learning & Change Management Consultant at Traveling Coaches, talks about starting a new year with a new focus on ways to improve communication across diverse groups, specifically millenials and different cultures, along with new communication trends. Carolyn lays out her plan and discusses resources she looks to for inspiration.
Eileen’s starting out her year focusing on measuring what matters. How will you know when you are successful or when you’ve met your goals? And how can you continuously improve if you have nothing to measure against? Oh, the places you’ll go if you measure!
The National Institute of Standards and Technology (NIST) came out with findings from a study that indicated that many people are experiencing what they refer to as a new "phenomenon" …Security Fatigue. Let’s begin 2019 with a new mantra: Live informed! Not in Fear!
In the Fall, everywhere you look, you can find food and drinks with pumpkin spice. There’s something to the trend! How can we use key concepts used by marketers of these products to spice up our security awareness programs?
Since October is National Cybersecurity Awareness month, it’s the perfect time to make resolutions that include ramping up your security awareness program (or initiating one). Throughout the month, I will share a little Fall inspiration as I explore ways to give your program a boost.
In part three of this three-part series following ILTACON 2018 sessions on the same topics, we discuss RESPONSE. This blog follows the highly anticipated session on the response of DLA Piper after last year's NotPetya malware attack.
In part two of this three-part series following ILTACON 2018 sessions on the same topics, we discuss DETECTION. Programs, processes, solutions and education must be in place to detect attacks on the data we've been entrusted to protect.