TechBento is vendor agnostic, which means tailor solutions to our customer needs. We do not accept incentives or payments from our vendors. When we choose to highlight a vendor or use their products it is because we believe they are best-in-class.

Filevine Legal Case Management Software receives a rare Five-Star Bento Trust Rating

By |2022-08-02T19:23:09-05:00June 27th, 2022|Categories: Vendor Spotlight|

With the launch of Bento Security we have been moving our IT/IS clients to an organized and proactive effort to manage cybersecurity risks.  Vendor Supply Chain Risk Management was one key area of focus with the introduction of Bento Trust Rating as a guide for helping our clients understand their own suppliers.  While the rating system [...]

Successfully Transitioning to Filevine Legal Case Management.

By |2020-07-01T13:16:34-05:00June 25th, 2020|Categories: Vendor Spotlight|

Law firms are increasingly interested in adopting software-as-a-service legal case management solutions to modernize their existing practices. We have been asked repeatedly to provide security insights into adopting SaaS products including CasePeer, LEAP, PracticePanther, Clio, TrialWorks, SmartAdvocate, GrowPath, Cloudlex, and Filevine. Our role is to help firms make the right choice and prepare their practice for adopting [...]


Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.


Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.
Go to Top