Entries by Reece Guida

PracticePanther Helps Divorce Law Firm Grow and Serve Clients Through COVID-19

Helping Families Through Divorce Attorney Tracy Shanks takes a different approach to Divorce and Family Law. Her practice has garnered exclusively 5-star reviews on Google. Nearly all the reviews from clients of Rotharmel Shanks, LLC have heartfelt and detailed comments about her professionalism, compassion, and responsiveness. When we spoke to Tracy about what motivates her, […]

What Is The CARES Act and How Can It Help Legal Professionals?

On March 27, Congress passed the 2020 Coronavirus Aid, Relief, and Economic Security Act (CARES) to mitigate the negative economic impact of COVID-19. The CARES Act provides small businesses and individuals with extended unemployment insurance benefits, loans for paycheck protection, refundable tax credit, and business tax provisions. Attorneys who own their own practice can take advantage […]

New Conditional Workflows Make Case Management Easier

  Anticipate trial deadlines and assign tasks at your firm Building on tasks and events in PracticePanther, conditional workflows bring collaboration and convenience to the case management experience. Now, you can keep your agenda clean and focus on what matters at the moment. A more focused agenda Conditional workflows keep track of what’s coming next […]

2020 ABA TECHSHOW Guide

The ABA TECHSHOW is the biggest legal industry conference of the year. It brings together thousands of lawyers and technology providers from all over the world. Attendees spend three days learning how legal tech can help them practice more effectively and serve clients with the most advanced standards.  The annual ABA TECHSHOW  in Chicago offers […]

How Law Firms Can Prevent Phishing and Malware

Law firms harbor information directly linked to politics, public figures, intellectual property, and sensitive personal information. Because lawyers rely on email to manage cases and interact with clients, hackers exploit technical vulnerabilities and people via email. After cybercriminals infiltrate a law firm’s systems in a successful phishing or malware attack, they leverage breached information for […]