TRAINING
ARTICLES
All Articles
Review
Select
IMPLEMENT
SUPPORT
TRAINING

The benefits of remote training
by Beccy Scobell | 27 Sep 2023
Covid did not only change the way we travel the world, but it fast tracked the way in which law firms work, with less people in the office and more staff working remotely, but has IT training adapted to meet these new needs? “Remote working” has now become a...

Part 2 – The Benefits of Involving Users When Developing a Case Management System
by Chris Winterburn | 13 Sep 2023
Developing a case management system is a complex endeavour that requires careful planning, collaboration and consideration of various factors. One of the most crucial aspects of this process is involving the end-users who will interact with the system on a daily basis.

Speech to text features in Word
by Beccy Scobell | 31 Aug 2023
A couple of months ago, Beccy Scobell wrote an article about my personal “quick wins” in Microsoft. There are of course many useful features across the Microsoft products, but this time I would like to focus on Word specific features, specifically speech to text.

Part 1: The Danger of Over Developing A Case Management System
by Chris Winterburn | 22 Aug 2023
In the ever-evolving landscape of technology, organisations are continually seeking to optimise their operations through innovative solutions. It is often the case firms seek to automate legal process, especially in "high volume, low value areas” by the development of...

The Dangers of Duplicate Party & Client Records in a Case Management System
by Chris Winterburn | 19 Jul 2023
The efficient management of party and client records is crucial for law firms to ensure effective case management and to gain insights into the relationships the firm has with clients and 3rd parties alike. However, the presence of duplicate records within a case...

Why upskilling is important?
by Beccy Scobell | 25 Jun 2023
When we are sat at our desks doing our day-to-day job, we know what work needs to be done, what the outputs should be and the time by which we need to do something. We all experience pressures around areas such as accuracy, speed and client service. Knowing what we...

Should IT skills be tested when hiring?
by Beccy Scobell | 14 Mar 2023
I have been asked the question “Should IT skills be tested when hiring” many times when working both “inhouse” and as a consultant, and I still have the same answer as I did 5 – 6 years ago…

What Is It Like to Transition from An Internal IT Manager to An IT Consultant
by Chris Winterburn | 9 Mar 2023
Transitioning from an internal IT manager to an IT consultant can be a significant but exciting change in career path. While both roles involve managing technology, the responsibilities and challenges are quite different.

Quick Wins in Microsoft
by Beccy Scobell | 11 Dec 2022
It is very difficult to know every function in each of these products, Beccy Scobell shares her personal “quick wins” in some popular Microsoft products.

In-house trainer to consultant
by Beccy Scobell | 30 Sep 2022
Today I find myself reflecting on my first 3-months as a consultant. I’m thinking about how much I have grown in my knowledge of systems, my self-confidence, and how important IT Training is!

Ways training can help lead to a successful rollout of an IT System
by Beccy Scobell | 18 Jul 2022
When a new software application is rolled out to a firm, training is needed. Everyone knows and agrees that some sort of training is required, but depending on who you ask, the next questions will have different answers: When should training be included in the...

Stranger on a train
by David Baskerville | 29 Feb 2020
You’ve read the articles, you’ve sat in the seminars, so you know how it goes. We’re talking cyber security and you know what’s coming…

Cyber Awareness
by David Baskerville | 28 Nov 2019
It has to be accepted that human behaviour is the biggest risk to a firm’s security but it should also be recognised that staff members are now under a constant attack from organised cyber criminals and therefore need education and protection from social engineering hacking.