Publications

December 8, 2013

Weekly Report 13-50

“MOST LEADERS, NO MATTER HOW EXPERIENCED, DO A POOR JOB of establishing clear, indisputable expectations of others. Then, because of lack of clarity, people may do their best, but it’s not exactly what was ‘hoped’ for and disappointment sets in.” Good delegation or assignment of an expectation involves: (1) Defining the deliverable – form, degree... Continue
December 6, 2013

Strategic Planning Is More Than A Business Plan

Our Firm has offered strategic planning services to our clientele since the early 1980’s, with consistently effective results. As the pace of technology quickens and as competitive forces increasingly threaten business margins, the importance of such planning has become more critical than ever — both to the simple maintenance and protection of existing business entities,... Continue
December 5, 2013

Risk Management – Hazard Controls

By Dennis Duitch & Marcia W. Wasserman Los Angeles Daily Journal California Law Business July 10, 2000 The practice of law has changed over the last decade and will continue to change as a result of the technological revolution and its impact on how firms practice. Law firms today need to operate more as businesses than... Continue
December 1, 2013

Weekly Report 13-49

MILLENNIAL PERSPECTIVE UPDATE: Some 80 million Americans (a quarter of U.S. population) now age 18 – 34 are “the most diverse, well-educated, interconnected generation in history, having lived their entire lives amid the greatest technological shift since the Industrial Revolution.” Roughly half voted in 2012 with 56% preferring “bigger government,” but only 26% consider themselves... Continue
November 24, 2013

Weekly Report 13-48

“PHISHING MESSAGES TRICK ONE IN FIVE EMPLOYEES.” One recent campaign induced 72% of users to click on a malicious link. Most effective message content is apparently a fake lure for Employee Discount, targeting “specter of loss (e.g. thanks for your $500 purchase at Amazon),” or that the recipient won something. “Online thieves use phishing to... Continue