Filtered by category: Business Partner Articles Clear Filter

New Jersey’s New $15.00 Per Hour Minimum Wage: What Businesses Need to Know

By Andy Surtz

New Jersey’s governor, Phil Murphy, promised during his campaign, that he would raise the minimum wage in New Jersey.  As of February 2, 2019, this promise became a reality.  Governor Murphy signed a new law that would slowly raise the minimum wage for most hourly employees by the year 2024.  This bill will effectively raise the current minimum wage of $8.85 per hour to $15.00 per hour at an increment of approximately $1.00 per year.  Prior to this new bill, New Jersey raised its minimum wage by $0.25 per hour to accommodate a cost of living increase in January 2019.  Here is what you need to know about this new bill and how it will affect your business.

How Does the Minimum Wage Increase Work?

Read More

Quality Maintenance Matters

By Gabriella Colasacco Hermey

Material selection and cleaning methodologies for floor surfaces have experienced many different trends over the years, but one truth always remains: quality matters.  Quality relationships, quality materials and quality maintenance contribute to a healthy bottom line and a healthy facility.
Stone and carpet are two of the most popular surfaces found in law offices.  There are key maintenance fundamentals and best practices every facility/office manager should know when selecting and caring for these materials.

Stone

Stone will never go out of style, and if properly maintained, this surface will last the life of the facility.  From marble and granite, to travertine and limestone, stone has been used for centuries for architectural finishes, on vertical and horizontal surfaces alike, due to its attractive appearance and durability.
Different types of stone may look beautiful side by side or throughout contiguous areas, but stone selections should not be made by aesthetics alone.  Stone surfaces, whether vertical or horizontal, interior or exterior, require different care based on material, traffic patterns and usage.  For example, it is not a good idea to pair marble and granite or marble and terrazzo together for several reasons, including variations of density and hardness, and incompatible maintenance requirements that could cause harm to the neighboring stone.  Choosing stone from the same family or stone with similar maintenance needs, such as marble and limestone, combined with a tailored routine surface care plan, will help ensure your stone floors last for centuries.
After the January 2017 effective date of OSHA 1910.21 subpart D, Walking-Working Surfaces and Personal Protective Equipment (Fall Protection Systems), the trend to choose textured stone surfaces and finishes has increased.  The updated law is designed to “help prevent and reduce workplace slips, trips, and falls, as well as other injuries and fatalities associated with walking-working surface hazards”.  Under 1910.21, OSHA defines general industry workplaces walking-working surfaces as floors, stairways, steps and aisles, among other horizontal, vertical and inclined or angled surfaces.[i]
Stone floors, textured or smooth, are exceptional architectural finishes for just about all types of facilities; but, remember, choosing high-quality materials is only the first step in creating beautifully designed spaces.  Having an expert surface care consultant provide a long-term maintenance strategy, cost analysis and surface recommendations before a flooring investment is made is a close second, if not as important as the first step.  The same qualified consultant can provide a field assessment and offer recommendations for existing floors that may involve restoration as needed and an ongoing cleaning and maintenance plan.

Carpet

Read More

Four Recruitment Strategies to Help Law Firms Succeed in A Candidate-Driven Market

By Micki Mersky

Today’s job market is the most competitive in a generation.  In this climate, providing a positive candidate experience is critical to attracting and hiring the best talent available.  However, many law firms are struggling to deliver without the right recruitment strategies.  A great candidate experience, from job posting to offer, does not only create excitement for one great candidate; it can also lead to higher quality applicants, more hires and new referrals.
As a result, it becomes clear how much the hiring process matters in providing a great first impression to new hires.  For employers who want to gain an edge on their competition, consider the following recruitment strategies to transform your candidate experience in 2019.

Portray a strong employer brand

According to The Execu|Search Group’s 2019 Hiring Outlook, 59% of job seekers spend thirty or more minutes researching a company throughout the hiring process.  Between websites, social media, press and employee review sites, every candidate has a strong impression of your organization before her or she walks in the door.
As a result, it is critical that law firms utilize these online platforms to reach out to those candidates looking for the right fit.  When a job seeker looks at your law firm online, he or she should be able to determine who you are, what you do and why you’re a great place to work.

Be flexible in your requirements

Read More

Mail Fraud Tips

By Peapack-Gladstone Bank
In light of recent check thefts from mailboxes, the following are local law enforcement tips to avoid mail theft:
Bank online: Refrain from mailing checks, cash, gift cards or other negotiable items if possible.  Use online banking instead.
Use a gel pen: If you must send a check in the mail, use a gel pen to write out checks.   Ballpoint pen ink can be easily washed off a check.
Mail at post office: Take those checks to the post office counter to be mailed and record the name of the postal employee who takes those checks.
Use plain white envelopes to mail checks: Do not use return envelopes with the utility logo or municipality for tax payments on them.  These are easy targets for thieves.
Monitor bank activity: Check bank activity online and review bank statements as soon as they are received to check for discrepancies.
See something, say something: Call 911 to report any suspicious activity near mailboxes.
Report the theft: If you have been a victim of mail theft, call the U.S. Postal Inspectors Service at 877-876-2455 and choose option 4.
More tips from the U.S. Postal Inspectors website:
- Use the letters slots inside your post office for your mail, or hand it to a letter carrier.
- Pick up your mail promptly after delivery.  Don’t leave it in your mailbox overnight.  If you’re expecting checks, credit cards or other negotiable items, ask a trusted friend or neighbor to pick up your mail.
- If you don’t receive a check or other valuable mail you’re expecting, contact the issuing agency immediately.
- If you change your address, immediately notify your post office and anyone with whom you do business via the mail.
- Don’t send cash in the mail.
- Tell your post office when you’ll be out of town, so they can hold your mail until you return.
- Report all suspected mail theft to a postal inspector.
- Consider starting a neighborhood watch program.  By exchanging work and vacation schedules with trusted friends and neighbors, you can watch each other’s mailboxes (as well as homes).
Consult with your local postmaster for the most up-to-date regulations on mailboxes, including the availability of locked centralized or curbside mailboxes.
Peapack-Gladstone Bank, founded in 1921, is a high-performing boutique bank known nationally for unparalleled client service, integrity and trust.  For more information on Peapack-Gladstone Bank’s leading wealth, lending and deposit solutions, please contact Terese S. Gardenier, SMD, Escrow Services, at [email protected].  
The Security Tips provided are for informational use only and are not intended for financial or investment advice.  Peapack-Gladstone Bank and its affiliates assume no liability for any loss or damage resulting from one’s reliance on the material provided.

Smart Change Starts Here Tip Sheet: Five Solution Features to Consider

By Canon Solutions America, Inc.

Prioritize Document Control and Security

A law firm IT administrator needs to wear a lot of hats to be successful.  Network maintenance, third-party vendor management and data security are just a few of the administrator’s responsibilities.
Data security is a common top priority due to the volume and nature of information that is handled during legal review.  A workflow solution designed for document control and security can help law firms limit access to private client data without adding a lot of work to overwhelmed IT teams.
Choosing the right solution for your law firm can be time-consuming.  Here are five important features to consider when implementing a secure, easy-to-manage document control solution.

1. Documents are stored, managed and accessed within the perimeters of a secure ecosystem

Read More

How Much Does VoIP Phone Service Cost a Small to Midsize Business?

By Vincent Finaldi

In the VoIP industry, one of the most common questions we are asked is, “How much does a cloud-based VoIP phone system cost?”  The answer is…it depends—primarily on three main factors.  To help you get a sense of how pricing is determined in the VoIP industry, we’ve openly and honestly discussed those three factors below.

VoIP Pricing: A History Lesson

Read More

Artificial Intelligence's Impact on the Legal Industry

By Paul Sperry

Over the last few years, the legal industry has found itself in the midst of a sea change that has been exacerbated by competitive pressures, an increasingly intelligent client base and the advent of technology to control costs and affect outcomes.  Although there’s been tremendous interest around topics like alternative billing models, e-discovery, legal processing, outsourcing, mobility, cloud strategies, big data, security, etc., today it seems like everyone (engineers, data scientists, entrepreneurs, business owners, senior management executives and, yes, even lawyers) is talking about artificial intelligence (AI).

The Wikipedia definition of AI is “intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals.  A machine imitating human behavior, such as ‘learning’ and ‘problem solving’.”  The definition continues to change, and has been split into two broad types of AI—narrow (applied) and general.  Narrow AI is intelligent systems that have been taught to carry out specific tasks without being explicitly programmed to do so, e.g., Apple’s Siri and Amazon’s Alexa.  General AI is the type of adaptable intellect found in humans, a flexible form of intelligence capable of learning how to carry out vastly different tasks.

Read More

Moving to The Cloud and How to Get There

By Rich Kukla

The Cloud—Past, Present and Beyond

Over the past few years, the discussion concerning moving to the cloud has become one of the top topics of conversation in the IT industry.  As with any major infrastructure change, there are lots of options to consider, and there is no one-size-fits-all solution for a cloud migration.
 
By definition, “the cloud” is nothing more than a data center that is accessible over the public Internet.  By moving to a cloud infrastructure, you’re moving your company’s data to someone else’s server, and paying a rental fee for that service.  Instead of purchasing physical servers, and hosting those servers at your office, your data would be stored in a data center, and you can access that data as needed.  This eliminates the need to refresh your on-premise server hardware every few years, and potentially increases your data’s accessibility.

The Cloud Ahead

Read More

Breach Response Checklist for Law Firms

By Stew Smith

These days, data breaches have become almost commonplace.  It’s no longer if you get breached, but rather when you get breached.  While prevention is still key, it is important law firms implement procedures to quickly detect breaches and contain the damage once confirmed.  Likened to fire preparedness in an office building, cyber-security should be a non-negotiable component of a responsible workplace, regardless of size.  Don’t have a plan in place?  Here is a checklist of items to get you started: 

  • Review your state’s data breach laws and make a list of entities you have to contact.
  • Contact law enforcement or consumer protection agencies, if your state law requires it.
  • Contact your data security specialist or IT consultant.  If you don’t have one, you may want to hire someone to perform an IT security audit so you’re less likely to experience another data breach in the future.
  • Reach out to your insurance company if you have cyber liability insurance.  Your cyber liability insurance provider will pay for some of the costs associated with responding to a data breach, including (depending on your policy) crisis management, credit monitoring and data breach investigation.
  • Investigate the breach, compiling information as to where it occurred and what data was lost.  (If you’re not particularly tech-savvy, hiring a security consultant to perform an audit may be wise.)
  • Repair any security weaknesses, but keep records and evidence of the breach (which you might need to turn over to law enforcement agencies later).
  • Contact a credit monitoring company about fraud and IT theft prevention services you can offer your customers.
  • Set up a telephone line or e-mail address to handle incoming questions and concerns from customers.
  • Post an announcement on your website about the data breach and how customers may contact you with questions.
  • Notify individual customers (via e-mail, telephone or mail, in accordance with state regulations).

Post Assessment & Planning

  • Assess gaps and evaluate effectiveness of plans, procedures and staff training.
  • Adjust security and response plans and processes; communicate and train accordingly.
  • Stay current; test your plan often and remain aware of changing threats and law.
Failing to prepare is preparing to fail.  Take some time to review this checklist and get the ball rolling on a response plan today.  Educate yourself on best practices, seek guidance on where you might be most vulnerable, patch any weaknesses and develop a strong security response plan for potential incidents and recovery.
Stew Smith, CISM is Vice President of Business Development at Business Machine Technologies, Inc.  A 21-year member of the BMT team, Stew helps new clients get the most from BMT’s arsenal of services.  A former Senior Network Engineer, and Operations Manager, Stew has authored many of BMT’s procedures and policies.  Stew may be reached at [email protected].

The Power of Color—An In-Depth Look at the Perception of Law’s Top 3 Choices

By Jim Weber

Color.  It can make you feel.  Make you pay attention.  Make you remember.

While the topic of color theory, color psychology and the effects of color in advertising is broad, we will focus on the top three colors used in large law firm branding, and how those colors can influence a potential client's impression.

Read More

The State of Cybersecurity

By Douglas Concepcion

Based on the historical trend established over the last few years, it is expected that the number and sophistication of cyber-attacks will continue to increase.  54% of the professionals in the cybersecurity space anticipate a successful attack against their organization within the next twelve months.  Even though security budgets have been increasing over the last several years, the return on the investment has been decreasing, i.e., what is known as the trickledown effect.  This means that nation states and sophisticated actors (all black hat hackers) have been developing very powerful tools over the past (approximately) ten years, and as with all technical development, the tools eventually make their way into the public space.  In these cases, very innovative malware is now being used by criminal actors to circumvent the cybersecurity (hardware and software) of organizations.  Due to this level of concern, most organizations, on average, are increasing their security budget by 21% in the coming year, with a focus on securing planned or existing cloud infrastructures, applications, training and education of staff and mobile devices. 

The biggest hurdles experienced by organizations is lack of knowledgeable or skilled employees in cybersecurity; with an overall shortage worldwide of about 800,000 at the present time, that number is expected to increase to 1.7 million unfilled cybersecurity positions globally by 2020.  This shortage is causing organizations to increase training of existing staff in cybersecurity, and to contract with companies that offer Managed Security Service Provider (MSSP) and Managed Service Provider (MSP) services.  A primary reason for the outsourcing to one of these organizations is that these service providers already have a dedicated staff in place 24/7, with the required skill sets for managing cybersecurity.  This removes a large portion of the security personnel burden from the organization, while also sharing the responsibility of security operations.

Read More

Five Tips to Help Create a Safe Work Environment

By Andy Surtz

Since before 2018 even began, you could not turn on the television, radio or computer without seeing or hearing news of another person falling victim to harassment in the workplace.  The #metoo movement is long overdue, though it is taking the world by storm.  A conversation that should have occurred in every workplace for decades is now happening consistently.  The idea of a safe work environment is not new.  However, it can be guaranteed that this idea is not going anywhere any time soon.  Employees, as well as employers, are taking notice of issues that may have been swept under the rug or laughed off in the past.  Here are five tips to help make sure you are creating a safe and inclusive work environment.

Read More

Act Now…Before It’s Too Late! Can Smaller and Mid-Size Law Firms Successfully Adapt to the Changing Marketplace?

By John Remsen, Jr.

According to recent surveys conducted by The Managing Partner Forum and others, far too many smaller and mid-size law firms are doing little, if anything, to evolve and adapt in the face of rapid and accelerating change in the legal services industry.  What little innovation does occur is driven by the client in almost every case. And that’s not good if smaller and mid-size firms want to survive.

Read More

The Five Compliance Questions You Should Be Asking Every Vendor

By Jerry Colasurdo

A common buzzword in the last few years, compliance is a top priority for many law firms.  In the process service industry, we’ve seen a significant increase in compliance requirements, especially in the financial sector.  Whether mandated by federal or state rules and laws or put in place due to increasing pressure from clients, securing confidential information is critical for law firms of every size.  Being compliant requires a proactive approach that covers all the bases. 

Read More

4 Tips for Law Firms Who Want the Most Out of Their Process Server

By Amanda Sexton

Process service isn’t something every office manager has to deal with on a regular basis.  But with the potential to impact client satisfaction, staff workload and timelines for cases, it should be on every administrator’s radar.  Below are some helpful tips you can use (or pass along to your staff) to make sure subjects and entities are getting served as quickly as possible.

Read More

Competent and Reasonable Measures of Data Security

By Kevin Roth

The probability of a malware attack on the legal community is higher than ever.  In 2015, Cisco ranked law firms as the seventh most-vulnerable industry to “malware encounters”.1 Bloomberg Law reported in 2015 that at least 80 of the 100 biggest [law] firms in the country, by revenue, have been hacked.2  Cybersecurity firm, LogicForce, recently released a report that revealed over 200 U.S. law firms faced hacking attempts for confidential client data between 2016 and 2017, and 40% of the firms didn’t even know the attack had occurred.  Additionally, the LogicForce report found:

Read More

Business Development—Five Ways to Impress Clients

By Anne Itri

The number one rule of business development is to always impress your clients.  Happy clients will continue to give you their business and are much more likely to give you additional business and referrals.  The number two rule of business development is to always impress those with whom you work.  Eventually, they will have a need for your services and remember you.

Read More

Like Blood Pressure, Your Copy and Printing Costs Should be Checked Regularly

By Joe Donohue

Unless you’ve implemented a print policy in your office, there’s a good chance your print volumes and costs may be higher than you think. Like high blood pressure, high copy and print expenses left unchecked can have a negative impact on the overall health of your company. Even in today’s economic climate that demands expense visibility and control, the avoidable waste associated with office printing is eye opening, to say the least!

Read More

Designing Suburban Law Firm Workspace

By Dana Nalbantian, Jennifer Ellis-Rosa, IIDA, LEED AP ID+C and Rosemarie DeCiccio, CID, IIDA, LEED AP

Gensler, a global interior/architecture design firm with a focus on law firm design, hosted an NJALA workshop at its Morristown, New Jersey office on Wednesday, February 28, 2018.  The session gave a glimpse into the design process for creating law firm workspace.  The Gensler design team led participants through three activities to simulate the preliminary phases of the design process. 

Read More

10 Rules-Based Printing Tips to Reduce Your Firm’s Print Costs

By Joe Miller

If you're reading this, you might have already heard about rules-based printing, and then you're wondering how it can help you.  Beyond the productivity, control and information gains that a rules-based printing environment brings, you can also reduce your overall print footprint (a footprint that determines how large your printing expenditure is and will continue to be).  Shrinking your print footprint is the only sure-fire way to lower your overall costs.

There are 10 major ways that rules-based printing can be leveraged to reduce print costs:

Read More