What Technology Should Small Law Firms Choose

Lawyers Looking At A Computer

It is questionable whether there is any industry today that has not been forced to adopt new technology to remain competitive. But for small law firms, the need to utilize technology appropriately is necessary for more than just competitiveness—it is actually being increasingly pushed by jurisdiction. In just the past few years, the ABA Model Rule 1.1 went through revisions so that the rule now states that attorneys need to maintain a certain level of competence with technology, and 36 states have adopted the revised comment to Rule 1.1.

Lawyers Looking At A Computer

With technology competency becoming a standard for practicing attorneys, it is clear that every law firm needs to do what it can to incorporate technology into their practice. What this adoption will mean may vary somewhat from firm to firm, but the general push should be to meet the standards of the industry in all possible areas. For many firms, that will mean making some changes.

Technology for Small Law Firms—What You Need to Know

Where you and your firm sit on the technology spectrum may be far different from another attorney or another firm. You may have already taken significant steps to incorporate technology tools into your operation. You may have been doing things the same way for decades and only be interested in making the minimal changes to comply with changing professional expectations. Or, you may be somewhere in the middle. The following tips are meant to serve as a starting point on how to identify where changes need to be made and to make those changes as efficiently as possible.

Set aside time for research and the adoption of new technology.

For most lawyers, time is at a premium. Between courting new clients, keeping up with legal changes, researching cases, preparing and filing documents, traveling and doing all the other things required for you to run your firm, you are probably quite pressed for free time. However, you are also adept at measuring the workload of new projects and making time for those projects—which means you have the ability and aptitude to make technical changes to your firm. You just need to remain aware of what you are getting into and set a pace that fits with your circumstances.

If you do not want to do all of the work yourself, you can also delegate or outsource it. Whether you assign duties to employees, hire an IT services company familiar known for servicing law firms, or both, you can accomplish a lot when you share the workload.

Learn what it means to be technically proficient as a law firm.

You may already have clear ideas about the changes you need to make. But if you aren’t, consider doing some research on legal tech today. There are books available that discuss legal tech for small firms and there are plenty of websites that do the same. Educate yourself on what a technologically savvy firm looks like today so you can see where your firm is lacking and where you should aim to be moving forward.

Areas to research include:

  • Document management
  • Time and billing software
  • Legal practice management software
  • Collaboration tools
  • Security technology
  • Mobile technology
  • Potential technology certifications available

Conduct an assessment of the technology your firm uses.

Once you have an idea of what the expectations for legal technology use are in today’s environment, you can conduct an assessment of your firm to see where you are and what changes you need to make. Identify what technology you currently use for various tasks, determine what changes need to be made, if any, and then make a plan to facilitate those changes.

Prioritize technology adoption.

Ideally, you could make all the changes you need to make simultaneously. But if you do not have the time, resources, or assistance to make all those changes possible right now, you will need to prioritize which are most important. Your priorities will be based on the specific goals of your firm. For example, e-filing is becoming an industry standard for law firms. If you are still using mostly paper, moving into an e-filing system will probably be a big priority. That may mean purchasing a scanner to digitize your existing documents, as well as implementing an e-filing system for your firm to use moving forward.

Consider Partnering With A Managed IT Services Company.

Most small firms do not have the resources to employ a dedicated IT department. Managed IT services offer a way to take advantage of technical proficiency and skill sets as you need them—like when you need to do a technology overhaul on your firm. You can get the assistance you need from professionals so you can focus on running your firm.

If you would like more information about managed IT services for your solo practice or small law firm, please contact us.

Critical Update From The NSA

NSA Windows Security Warning

The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows

The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by Microsoft stressed the importance of installing patches to address a vulnerability in older versions of Windows.

NSA Windows Security Warning

Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the Internet. We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact, and are seeking to motivate increased protections against this flaw.

CVE-2019-0708, dubbed “BlueKeep,” is a vulnerability in Remote Desktop Services (RDS) on legacy versions of the Windows® operating system. The following versions of Windows® are affected:

  • Windows® XP
  • Windows® XP
  • Windows Server® 2003
  • Windows® Vista
  • Windows Server® 2008
  • Windows® 7
  • Windows Server® 2008 R2

What Is A Wormable Virus?

This means that the virus can get into your system without you doing anything like clicking a malicious link. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights without your knowledge.

Any future malware that uses this vulnerability could propagate from one vulnerable computer to another. This is how similar malware like WannaCry spread around the world. Experts are worried that this flaw could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017.

Another Problem

Although Microsoft has issued a patch, potentially millions of machines are still vulnerable. This is the type of vulnerability that malicious cyber actors frequently exploit through the use of software code that specifically targets the vulnerability.

For example, the vulnerability could be exploited to conduct denial of service attacks. It is likely only a matter of time before remote exploitation tools are widely available for this vulnerability.

NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

What Should You Do?

Microsoft has released a critical update for their Remote Desktop Services that impacts multiple Windows versions. The patches are for devices and systems that are both in and out-of-support, which is rare for Microsoft to do. This shows the importance of these patches.

The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests. To apply the patches, go to the Microsoft Security Update Guide for in-support systems and KB4500705 for out-of-support systems.

Microsoft recommends that customers running one of these operating systems download and install the update as soon as possible.

Does This Mean Even Systems Without Support Can Get The Patch?

Yes, Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. This means that you wouldn’t have received any security updates to protect your systems from the CVE-2019-0708 virus.

Given the potential impact to customers and their businesses, Microsoft decided to make security updates available for platforms that are no longer in mainstream support. All Windows updates are available from the Microsoft Update Catalog.

What Should You Do Before We Apply The Update?

It’s recommended that you back up all of your important data first. If you have a reliable backup, and if the patch creates problems, you can still access your data. You should do this before you install any patches.

What If You Can’t Apply The Patches?

If you can’t apply the patch for your system there are other things that you can do:

  • If you don’t need the Remote Desktop Services, you can disable it.
  • Block the TCP port 3389 (this prevents unauthorized requests from the Internet).
  • Enable NLA (Network Level Authentication) for Windows 7 and Windows Server 2008.

Of course, the best thing to do is to contact us. We’ll know exactly what to do.

What Else Should You Know?

If you had updated from Windows 7 to Windows 10 or from Windows servers 2008/2008 R2 to Windows 2016 or 2019, you wouldn’t need to worry. This is why it’s essential to keep your systems up to date.

Soon, on January 14, 2020, support will come to an end for all Windows Server 2008, 2008 R2 equipment and the Windows 7 operating system.

If you’re still using these servers or operating system, it’s crucial to replace them now so that there’s no disruption to your daily operations or loss of data.

Any hardware or software product that reaches its end of life is a potential gateway for hackers to enter through. In addition to the security hazard, there are other reasons why it isn’t a good idea to keep using old equipment such as unresolvable outages.

 

Was Your Photo and License Plate Number Breached?

CBP License Plate Breach

 CBD Reports 100,000 Photo and License Plate Breach

The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where the data was exposed, you could have been victimized.

CBP License Plate Breach

The department said on June 10th that the breach stemmed from an attack on a federal subcontractor. CBP learned of the breach on May 31st.

CBP report:

“Initial reports indicate that the traveler images involved fewer than 100,000 people; photographs were taken of travelers in vehicles entering and exiting the United States through a few specific lanes at a single land border Port of Entry over a 1.5 month period.”

CBP hasn’t reported when this 6-week period was.

Who Was The Subcontractor That Was Affected By The Breach?

CBP hasn’t said who the subcontractor was either. But the Register reports that the vehicle license plate reader company Perceptics based in Tennessee was hacked. And, these files have been posted online.

Additionally, the Washington Post reports that an emailed statement was delivered to reporters with the title: “CBP Perceptics Public Statement.”

Perceptics’ technology is used for border security, electronic toll collection, and commercial vehicle security. They collect data from images on license plates, including the number, plate type, state, time stamps and driver images.

Where Were The License Plate Readers Installed?

Perceptics license plate readers were installed at 43 U.S. Border Patrol checkpoint lanes in Texas, New Mexico, Arizona, and California.

CBP reports that “No passport or other travel document photographs were compromised and no images of airline passengers from the air entry/exit process were involved.”

CBP uses cameras and video recordings at land border crossings and airports. The images they capture are used as part of a growing agency facial-recognition program designed to track the identity of people entering and exiting the U.S.

Do We Know Whose Data Was Exposed?

No, we don’t. And to date, CBP hasn’t said if this data will be released. If we hear differently, we’ll be sure to report any updates, so keep watching this space.

Is Facial-Recognition A Security Threat?

Facial-recognition is a hot topic right now. The American Civil Liberties Union states:

“This incident further underscores the need to put the brakes on these efforts and for Congress to investigate the agency’s data practices. The best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place.”

Congressional lawmakers have questioned whether the government’s expanded surveillance with facial recognition could threaten constitutional rights and open millions to identity theft.

Today’s technology can recognize and track us without our knowledge or an option to prevent it. It’s inevitable that a new battle between surveillance and privacy will be taking place as more breaches occur.

What The CMO Needs To Know About Marketing Technology

Marketing Technology

Marketing Technology

Familiarity with marketing technologies is a must for today’s CMO. However, the range of tech knowledge across CMOs varies widely. Even if every CMO can benefit from some technical familiarity, the reality is that some CMOs know very little about technology while others know more than they will ever need to in order to fulfill their responsibilities. Wherever you happen to sit on the tech knowledge spectrum, it can be helpful to have a roadmap on where your level of proficiency and understanding should be headed. With the right approach to marketing technology management fundamentals, you can ensure that you are best equipped to help guide your company towards its objectives.

Marketing Technology for the CMO—What You Need to Know

If you have been a CMO for very long, you have seen how dramatically your responsibilities have changed in recent years. Where you once focused primarily on building your brand, advertising and customer engagement, today you juggle those responsibilities with embracing and leveraging a range of technologies and platforms. The rate of change is only increasing, so it is understandable that many CMOs feel a bit overwhelmed sometimes. Fortunately, there are key areas that you can focus on when it comes to marketing technology. By leaning into the right areas, you can ensure that your expertise and management efforts are focused where they will do the most good for your company.

The marketing technologies your company utilizes come together to form what is referred to as a stack. The way you approach the stack—both the existing tools you are using and the adoption of new tools—is a major part of how you manage the tech side of your role. You can be actively involved in initiatives related to marketing technology by:

  • Determining which technology is a priority
  • Helping with the creation of stack strategy
  • Conducting reviews of how the stack is performing
  • Creating a management structure where your team can fully leverage the available technology
  • Being aware of the company’s data strategy and actively contributing to its development

Key focus areas should include:

Ensuring Stack Strategy is Based on Marketing Objectives

There are a seemingly endless number of marketing technologies now available—all of them promising to transform the way you do business. But most of those tools are not ideal for helping you achieve your concrete marketing objectives. Those objectives, based off of the objectives of your business, should guide how you organize your stack. By making sure that technology serves to achieve specific objectives, and is not just a solution looking for a problem, you can streamline your technology usage.

Regularly Measuring the Performance of the Stack

When you adopt new technology, it is important to determine what metric you will use to determine if it is serving the needs of your company. With metrics in mind, you can set regular review sessions to analyze how each technology is performing. You can determine which products are working as expected, which are not working as expected, and which are working even better than expected. With measurements in hand, it becomes much easier to decide how you will move forward with each technology—and which you will eliminate.

Keep an Eye Out for Bloat in the Stack

A regular performance review will help you avoid the bloat that is so common with marketing technology stacks. You and your team can check to see which programs are being utilized and how well they are being used. You may discover that some tools are not being fully leveraged, while others may actually overlap in functionality with other tools. Your team can determine how to get the most out of what you are already using while also eliminating as much overlap as possible. Ideally, you want to use as few technology tools as possible but use the ones you do have as fully as possible. You can develop a lean stack that gets the job done without creating drag.

Create a Clear Data Strategy

There is plenty of data at your fingertips with today’s technologies. But it is not enough to have data coming at you and your team. You need to have a clear strategy on what data to collect, how to collect it and how to process it. The assistance of the IT department can come in handy here, as they should be able to work with you to develop and implement a strategy based on your marketing objectives.

Define Responsibilities

The way you and your company handle the technology stack will be based on the resources you have available. Some companies have numerous departments that can split up the work, while others only have a few people who need to devote themselves fully to the task. What is important is that you and your team define responsibilities. Once everyone knows what they need to do, it is much easier to ensure that everything that needs to be done is done.

Moving Forward

As a CMO, you can help your company achieve its objectives by utilizing technology. You do not have to be an expert in every technology you use; you simply need to know where to focus your efforts to achieve maximum effectiveness.

Size Doesn’t Matter: 7 Ways Small Businesses Should Think Big

Small Business Tips

Small Business Tips

You may be a small business, but there’s no reason you have to think or act small. Today’s technology innovations offer small businesses all sorts of powerful tools that just a decade ago weren’t available or were only affordable to large firms. Technology can help small businesses think like big ones in all sorts of ways. Here are 7 ways small businesses should start thinking bigger.

1. Embrace the Cloud

There are numerous cloud-based technologies that can help your small business punch above its weight. By embracing the cloud, you can save money, improve your staff’s productivity, and expand or contract IT operations far easier than you could without the cloud.

Entrust things like email and calendar hosting, file storage, and video chat to cloud-based software and infrastructure solutions. Most small businesses will pay less for a cloud solution than they would to purchase and maintain servers and software. This is due to the economy of scale: your cloud provider is operating at a very large scale, so the cost of adding just a bit more server space is negligible. Without cloud services, your small business shoulders all the unique setup and maintenance costs all your own.

2. Improve Your Website

Sometimes the difference between a successful small business and a failing one is as simple as the quality of their website. Your website is your digital storefront, but it’s also your digital billboard, white pages, classified ad, and more. If it looks terrible or doesn’t function well, you’re sending a poor message to your customers and prospective customers.

If revamping your website is more than your business can do well in-house, consider contracting with a vendor for this crucial task. Many managed service providers offer this service or can contract with qualified vendors who do.

3. Leverage Social

Your business needs a social presence, even if it’s small. This is true of all small businesses, but the smaller your business, the more important grassroots tools like social become. Share content regularly (including photos and videos) and encourage your most loyal customers to do the same.

As your brand’s social presence grows, it’s important to keep an eye on your reputation. What are people saying publicly about you? Is there anything you need to intervene on? Social can be a great avenue to see what challenges your customers are facing.

4. Use CRM Software

Customer resource management (CRM) software is the way big businesses keep in contact with customers in an organized fashion. CRM software isn’t limited to large firms, though. Affordable cloud-based options that work well with small business are available.

5. Big Data Isn’t Everything

Big data helps big companies win, right? That’s what we’re always hearing, and there’s truth to it. That said, we’ve all seen plenty of examples of big data leading companies astray, like “targeted ads” that miss completely or hyper-local campaigns that come off as fake or out-of-touch.

As a small business, you have access to something big businesses don’t: real, interpersonal data. Call it “small data” if you like. You likely know your customers much better than large firms do. Write down the things you learn. Better, input that information into your CRM software. You have the ability to send more personal notes than your large, faceless competitors. Capitalize on this.

6. Plan to Plan

You have a business plan in place, but as you grow, does your business plan grow with you? Your small business runs the risk of losing focus as it grows. Employees and leadership get so focused on daily tasks that they don’t keep their eyes on the overall plan. In other cases the overall plan becomes outdated and less applicable. Schedule time each year to review your business plan and goals, just like the big guys do.

7. Don’t Go It Alone

Lastly and most importantly, don’t go it alone as a small business. Your business is unique, set apart by some feature, product, or ethos that your competitors don’t have. Focus as much of your energy as possible on that thing, on your core competencies. As much as possible, divest yourself from other things.

One of those other things, for most businesses, is IT. Partnering with a managed service provider (MSP) to implement and support your IT infrastructure can save you money and increase productivity. You’ll also gain access to a deeper bench of IT professionals than you could afford to keep in house. If you’re ready to explore what we can do as your MSP, contact us today.

How Much Should A Company Invest In Information Technology?

Business IT Budgets

Business IT Budgets

The rapid increase in technology use in businesses has affected every industry. Across all businesses, the need to keep up with the competition means paying attention to what technologies are available and incorporating the right tech tools as they become viable. Whatever your business, you know that you need to invest in information technology to excel in your industry. But how much should you invest, exactly? To determine your IT budget, you need to look carefully at your industry, your business goals and most importantly, what you can reasonably expect information technology to do for you on your path towards those goals.

Putting Technology Investment in Context

Depending on what stats you read, it appears that businesses spend anywhere from 3% to 6% of their budget on IT. The average spend on tech is expected to go up in the coming years, but no one is quite sure how much it will increase. It makes sense to expect an increase, of course, given the drastic increase in tech adoption across all facets of daily life and business. But the amount of increase is hard to be certain of because no one is sure exactly what the future holds.

What is clear is that an IT budget is necessary for building and maintaining a business. However, the size of that budget can vary considerably depending on the business and the industry that business is part of. In a study conducted by Deloitte, it was found that banking and securities spent 7.16% of their budget on IT—the most of any industry—while construction spent the least at 1.51%. Other industries spent somewhere in between. Such a large difference in spending is indicative of a spectrum of need for IT that differs significantly depending on the business. Those differences make it impossible to define a one-size-fits-all budget percentage for IT for all businesses. There are simply too many variables to consider.

How to Determine How Much Your Company Should Spend on IT

Guidelines on how to determine your own IT budget can be much more useful than a blanket statement about how much you should spend. By knowing what questions to ask, you can get the answers you need to form your own ideas about what your company needs as far as IT goes.

Some questions you can ask include:

Do we need an IT budget?

The answer to this is an obvious “YES”, but it is worth coming up with your own reasons for having a budget to begin with. The closer you look at your circumstances, the more apparent it will be that IT is simply a part of doing business and an area that you will always have to navigate as a company. And it is not enough to put off IT decisions until you make a split-second purchasing decision financed by extra cash you have lying around—not if you want IT to generate reliable results. For long-term success, you need a specific budget.

What is the budget for?

IT investments should serve to further your business objectives. Pulling a random number out of the air is not going to achieve optimal outcomes. The budget should be set to ensure that you can use the technology you need to achieve the outcomes you desire. Of course, to answer this question, you may need to clarify your business objectives and your IT needs. The CIO, CMO and other business leaders can work together to set guidelines for what needs to be accomplished and the budget can be built from there.

Are we spending more just because?

Knowing that business spending on IT is increasing in many industries is useful, but just because others are doing it does not mean that you need to do it. Increasing spending on IT is not enough on its own to improve your business. That increased spending needs to have a purpose. Maybe you are upgrading important infrastructure. Or, perhaps you know of a new tech tool that is virtually guaranteed to make you more competitive. Just make sure that an increased budget has a purpose.

Is the budget based on current economic conditions?

Some businesses are still stuck in a recession mindset. They try to avoid any extra spending because they think it is a necessity for survival. But if the economy has picked up, it is vital to take advantage of increased revenue to bolster your technology while you can. The better you equip your company to move into the new age now, while you have the resources, the more capable your company will be of weathering any storms to come.

The reality of IT budgets is that they need to be customized to the business using them. Fortunately, the process of determining the IT budget can greatly improve your company’s understanding of where it is, where it is going and how technology will help it get there.

3 Security Tips For Australian Organisations

Australia Cybersecurity

Australia Cybersecurity

More than ever, cybercrime is a reality all businesses in Australia must face. No matter your industry, company size, or level of technology use, it’s up to you to ensure the security of your data and the strength of your security.

Together with the Cyber Security Working Group (CSWG), the Australian Taxation Office has developed 3 key tips to help businesses throughout the country combat cybersecurity. We’ve summarised these tips below.

3 Tips for Better Cyber Security

1. Ensure your system and individual accounts are constantly monitored.

All accounts owned or operated by your company need to be monitored constantly for unusual activity. This may mean hiring a security company to carry out consistent monitoring, but it will also mean checking your company interactions and transactions in-house. On an individual level, instruct your employees to follow the same self-monitoring protocol.

2. Train your employees in best practices for optimal security.

Evidence shows that phishing scams are at the root of most cybercrime activity. A phishing scam is generally conducted by email, but it can be done over the phone or by mail as well.

Most often, a criminal on the other end of the scam will send an unsolicited email to one or more employees in your company. The email will likely appear from a legitimate source, such as a bank, credit card company, security manager, or higher-up in the company. A key feature of a phishing email is the request to:

  • Reply with more information (usually personal or sensitive information such as a login or account number)
  • Login to an account you possess via a link the provided in the email
  • Click on a link for some other reason (to retrieve a prize you’ve won, for example)

In order to avoid phishing scams from affecting your company, the only truly effective measure is to train your employees in common cyber scam activity. Teach them how to avoid such scams. It’s important to teach your employees to:

  • Never click on links from or reply to suspicious emails.
  • Avoid providing sensitive information (logins, passwords, account numbers, access codes, etc.) when prompted by email. When in doubt, double check with the sender by calling them directly or speaking to them face-to-face to see if the initial message was real.
  • Never open attachments or programs from unknown sources.
  • Never leave their open or logged in computers or terminals unattended.
  • Watch your social media presence carefully. Not everything (meaning, sensitive details) should be shared on public accounts like Facebook, Twitter, and Instagram as hackers may come back to use this information with malicious intent. Make sure whoever is managing your social media accounts is aware of this.

3. Be wary of conducting business on public Wi-Fi connections.

Public Wi-Fi can be a tricky Internet connection to safely use because it’s not always secure from corruption by nearby hackers. This certainly goes for individuals on a personal level as individuals can easily be hacked via their bank account logins or by email, but it always goes for business conducted on company laptops or through company websites or cloud accounts.

This is often an issue “on the road.” Many businesses will send employees on company trips, during which they may want to use public Wi-Fi (at an airport, hotel, or restaurant, for example). In general, this should be avoided whenever possible, or, if it is absolutely necessary, only general, non-sensitive business should be conducted when connected to public Wi-Fi.

Is Cybercrime on the Rise in Australia?

Yes. Top businesses and the Australian government strive to attain optimal cyber defence capabilities. However, even as awareness of cybercrime grows, there are still mounting incidents of cybercriminals getting away with their crimes. This is partly because hackers can commit their misdeeds internationally — and most do. This makes them much harder to track as they often route their hacks through a variety of countries.

The best way to combat this type of criminal activity is to follow the directives listed above. Only thorough and attentive security monitoring and diligent training of employees can stop the threat of cybercrime to your company.

Sign In With Apple

Apple IOS 13

Apple IOS 13

Sign In With Apple…Should You Use It?

Apple recently reported that its new “Sign in with Apple” feature will be part of the iOS 13 release in the fall of 2019. It promises to protect your privacy, and authentication experts say it could have an enormous impact on data privacy.

What Is Sign In With Apple?

With Sign In With Apple, you’ll be able to log into your applications. It offers a single-sign-on functionality, much like other sign-in buttons such as Facebook’s, Google’s and Twitter’s.

What Are The Benefits Of Using Apple’s Sign In?

When you sign onto apps, Apple will mask your personal information and email address. But the application will still be able to contact you.

Unlike with Google, Facebook and Twitter, your email won’t be passed on to the developer. You can opt not to allow this, but you won’t be able to use their sign-in service. If you do choose to let Google, Facebook or Twitter track your email, they will also be able to see the applications you use.

Aaron Peck from Oauth explains:

“The way most “sign in with [blank]” systems work is that the app you’re signing in to will get your username on that service and likely also your email address,” he explained. “These apps can sell your email address to advertisers, or correlate your activity between unrelated applications by matching your username.”

Apple solved this problem with its single-use anonymous email address. You’ll be able to share the information you choose with the application. Apple creates a random, anonymous, single-use email address for each application. Apple then forwards emails sent to that address on to you. You have the option of deactivating the single-use email address whenever you want.

By using Sign in with Apple and the single-use email address, your true email address won’t be tracked. Apple is offering this to provide a more private option for use. And they are offering developers a way to provide a fast one-step login without forwarding their user’s data to another company. Apple’s button will also work on websites.

Can You Use Apple’s Sign In With Any Application?

No… only applications that integrate their systems with Apple’s Sign In button. Some may opt not to because they won’t be about to use your information for marketing purposes.

What Phones Can Use iOS 13 & Sign In with Apple?

These are the devices that will be able to use iOS 13:

  • iPhone XS
  • iPhone XS Max
  • iPhone XR
  • iPhone X
  • iPhone 8
  • iPhone 8 Plus
  • iPhone 7
  • iPhone 7 Plus
  • iPhone 6s
  • iPhone 6s Plus
  • iPhone SE
  • iPod touch (7th generation)

Is There Anything Else To Consider When Using Sign in with Apple?

If you are a developer, there may be. There are some concerns surrounding Apple’s terms and conditions for application developers. If they offer Google, Facebook or Twitter’s sign in, they must also offer Sign in with Apple.

And there’s more. According to Reuters:

Apple will expect developers to place their login button above Google’s or Facebook’s.

Apple Inc will ask developers to position a new “Sign on with Apple” button in iPhone and iPad apps above rival buttons from Alphabet Inc’s Google and Facebook Inc, according to design guidelines released this week.

The move to give Apple prime placement is significant because users often select the default or top option on apps […]

Apple’s suggestion to developers to place its login button above rival buttons is part of its “Human Interface Guidelines,” which are not formal requirements to pass App Store review. But many developers believe that following them is the surest way to gain approval.

This means that some app developers won’t have an incentive to actually add the Sign in with Apple feature. But Apple is getting around this by mandating that if developers what to place their app in the Apple App Store, and they already offer a third-party sign in, they must offer Apple’s.

Apple’s terms and conditions don’t require this for applications with a dedicated login system, and those that don’t use third-party buttons from Google or Facebook.

What’s The Benefit For Apple?

Sign in with Apple will improve users’ privacy and provide a far better experience than others.

Will LaSala, director of security services and security evangelist at OneSpan, tells us more:

Apple is going one step further than traditional single sign-on, they are forcing their users to use stronger authentication, such as Apple’s FaceID and TouchID,” he said, noting that Sign in with Apple will ask mobile app users to use the biometrics functions.

The use of adaptive authentication is what should be celebrated – the ability to prevent login tracking or protect a user’s information is a secondary benefit. Any way that we can get users to move to adaptive authentication that is easy and portable across many sites and platforms is a security win for the internet.

Apple is positioning themselves as the privacy provider. So when we want more privacy, Apple hopes we’ll choose to use their technology. It’s a great marketing strategy…something that Apple excels at. We think many people will want to use Sign in with Apple due to its privacy features.

Top Challenges Facing CEOs (How to Solve Them)

CEO Retaining Employees

CEO Retaining Employees

If you’re a CEO — whether your company is big or small, new or old, successful or working on it— there’s no doubt certain problems do a great job of keeping you up at night.

These are the challenges you just can’t seem to master. They plague you day-to-day, quarter-to-quarter, year-to-year. Yet try as you might, there seems to be no getting around them.

The good news is, yours are likely the same problems that all CEOs face. In other words, you’re in good company.

Below, we take a look at a few of these common CEO challenges and offer up some useful tips for tackling them once and for all.

Top Challenges CEOs Face

#1 – “How do I hire the best talent (and keep them motivated)?”

Attracting the best employees is certainly a leading cause of concern among CEOs. As a CEO, your team is the engine that drives your business. You may be the “ideas man” or “ideas woman,” but you need great talent to bring your concepts to life.

The Solution: Top employees can definitely hard to find, but it’s important to take your time. Quality hiring is doable if you know where to look, what to look for, and how to entice the right people.

First, make sure you’re clear about your job descriptions. Don’t be wishy-washy with prospective candidates.

Next, know where to look. Job fairs, sites like LinkedIn, and open job searches are good places to start. Still, you should always thoroughly review applications and prescreen candidates with a tight checklist before narrowing your best options.

Be thorough about checking your candidates’ references, backgrounds (job and education history), and experience. After you’ve made a short list, hold in-person interviews to get a feel for each candidate’s interest level and how they behave.

Lastly, when you find the right candidate, make sure you have a stellar hiring package ready to show them. Make it one they won’t be able to say no to. Budget restraints are certainly a challenge here, so if your resources are tight, find ways to promise pay and benefit increases with improved performance and company success. This shows your investment in your company — and in your employees as members of the larger company family.

#2 – “How do I retain my talent?”

Keeping employees motivated is certainly essential for extending and prolonging the flow of unique, creative ideas and hard work. Still, if you’re not taking care of your employees in other basic ways, some of them will walk away. Of course, this won’t necessarily be because they want to … they simply might have to.

The Solution: To ensure a consistent, long-lasting team of the best talent in your industry, you have two jobs:

1. Find ways to keep your employees motivated to do well.

2. Reward them for their hard work.

Many CEOs have trouble grasping the fact that their best employees won’t necessarily hang around just for the love of the work. This is often because, as CEOs, they’ve turned over their own life over to their business.

But remember that your employees — no matter how similarly passionate they are about your company — have lives of their own. Many have mouths to feed at home, student loans to pay, and second mortgages on their homes. If you’re not providing for them (as you said you would when you hired them) and incentivizing them to continue doing amazing work … you can probably expect their two weeks’ notice sometime soon.

In order to motivate employees, you’ve got to have a great idea that’s worth working for. Of course, it helps if you’ve hired a team that’s passionate about the same things you are.

Team-building is another great way to keep employees motivated. Organized company events, fun incentive programs, a comfortable work space, and opportunities for self-development within your company are key.

# 3 – “How do I make my product (or service) stand out?”

Yes, your company solves “problem A” … but so do six other companies. What you have to decide upon and sell is how you solve your problem better than anyone else.

Easier said than done, right?

The Solution: For the most part, the key answer here is creativity. Unfortunately, whether you like it or not, there are a lot of creatives out there doing awesome work. You’re probably creative too. But you have to be more creative than your competitors.

The good news is you have some options.

If you know for sure that your company is just like another company, for example, look for ways to differentiate by:

  • Unique branding
  • Varied size, shape, or level-of-service options
  • Amazing discounts and sales
  • Bonuses for loyal customers
  • World-class customer service
  • Added, unique features
  • Exceptional marketing *

* This is key. By investing in your marketing strategies, you’re tinkering with the first thing potential customers and clients will see — and that’s the right place to begin.

It’s true, if you can get someone to your website to read about your unique product features or see your amazing discounts, you might be able to turn them on to your product or service. But if you can “have them at hello,” you’re going to see a much higher and more immediate rate of success. Smart marketing will also give you one of the highest returns on your investments.

Generally speaking, all CEOs will face the above challenges at one time or another. The key to overcoming them is two-fold: First, try to anticipate whatever key issues you’ll have before they become serious dilemmas. Second, using the advice above, don’t be afraid to face these issues head-on. When something doesn’t work, don’t give up — simply try a new tack.

LabCorp Data Breach: What We Know

Labcorp Data Breach

Labcorp Data Breach

Are You One Of Many Affected By The LabCorp Data Breach?

Financial & Personal Information of 7.7 Million Exposed

Just yesterday we wrote about the Quest Diagnostics’ breach affecting nearly 12 million. Today we’re writing to tell you about a LabCorp breach affecting 7.7 million people. Both of these breaches were caused by a third-party; the American Medical Collection Agency (AMCA). AMCA provides billing collection services to both LabCorp and Quest Diagnostics.

AMCA has informed LabCorp that it is in the process of sending notices to approximately 200,000 LabCorp consumers whose credit card or bank account information may have been accessed. AMCA has not yet provided LabCorp with a list of the affected LabCorp consumers or more specific information about them.

In a filing with the U.S. Securities and Exchange Commission, LabCorp said the breach happened between August 1, 2018, and March 30, 2019.

A section of the filing reads:

“AMCA’s affected system also included credit card or bank account information that was provided by the consumer to AMCA for those who sought to pay their balance. LabCorp provided no ordered test, laboratory results, or diagnostic information to AMCA. AMCA has advised LabCorp that Social Security Numbers and insurance identification information are not stored or maintained for LabCorp consumers.”

The information included in the breached system includes:

  • Bank account information,
  • Credit card information,
  • First and last name,
  • Date of birth,
  • Address and phone,
  • Date of service and provider, and
  • Balance information.

Forensic experts are investigating the breach. It’s possible that the AMCA breach could impact other companies and millions of more consumers.

What Should You Do?

Anyone who was affected by the data breach should freeze their credit report to prevent criminals from opening credit card accounts in their name. They should also be concerned that their Social Security numbers were exposed.

If you believe that your information has been leaked, you can contact LabCorp customer service on their contact page.