Two New Libraries in Our Knowledge Base

Two New Libraries in Our Knowledge Base With the increasing number of Doxserá® DB users, it became apparent that our DB-specific training videos were scattered across our resource library. While DB only adds one additional function over Doxserá®—its ability to access external data—we have more than 20 videos demonstrating its various features, from how to…

Another Pro Bono Initiative

Another Pro Bono Initiative We’re honored to support classes at Arizona State University’s Sandra Day O’Connor College of Law with Doxserá® software for students. Whether assisting with legal education or providing tools to pro bono organizations, we’re committed to supporting the future of legal services. In fact, we’ve approved every pro bono request we’ve received…

Comparison of Benefits and Drawbacks of Cloud Environments for Document Assembly

Benefits and Drawbacks of Cloud Environments for Document Assembly Overview Cloud-based document assembly and automation solutions present a compelling option for modern businesses, given the numerous advantages they offer in terms of accessibility, scalability, security, and cost management. However, these benefits come with certain challenges that organizations must carefully consider before making a decision and…

Twelve Recommendations of Vendors That Take Security Seriously

Vendors That Take Security Seriously, Twelve Recommendations Note: We make these recommendations strictly as a satisfied customer. There is no compensation of any sort involved. Rackspace Technology cloud and dedicated servers https://www.rackspace.com/ Sucuri firewalls and attack mitigation https://sucuri.net/ Cloudflare content delivery and security https://www.cloudflare.com/ Bitdefender device security https://www.bitdefender.com/ MalwareBytes device security https://www.malwarebytes.com/ DuckDuckGo private, non-tracking…

Passwords and Email Addresses

We use and recommend three levels of password and email address security for both personal and business use. Level One, the most sophisticated, is for the most sensitive business, financial, identity, and personal health information. The second level is for sites and accounts that are worth protecting because they collect limited amounts of non-critical information.…