May 22, 2017 2:22 PM
May 18, 2017 1:37 PM
Read our CTO Mike Paul's article in Legal Ink Magazine!
May 8, 2017 9:17 AM
Our CTO, Mike Paul, offers our path to two-factor authentication, and why you should follow your own path to enhanced security with 2FA.
Over the next few weeks, Mike will tell our story and offer advice on moving to 2FA.
Innovative Computing Systems is a managed service provider with over 300 clients. Frequently, we become our client’s trusted resource for all things IT. One of the challenges that we have, as most organizations do, relates to password management.
April 28, 2017 9:49 AM
April 6, 2017 4:40 PM
April 4, 2017 2:56 PM
An often forgotten but vitally important component in planning or upgrading a document management system (DMS) is creating, implementing and maintaining a consistent and useful set of naming conventions. Too often, great emphasis is placed on a matter-centric workspace design and document types, but users are left without guidelines to enhance their ability to file and retrieve documents. Poorly named documents become just as hard to use in a DMS as they are in a paper file system.
April 3, 2017 11:01 AM
Topics: ALA 2017
March 30, 2017 2:38 PM
March 23, 2017 5:51 PM
Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhanced information security. Read the first few tips here, here and here.
March 9, 2017 10:08 AM
Law firms across the globe are consistently implementing vulnerability scanning
March 7, 2017 5:08 PM
March 6, 2017 4:19 PM
Many law firms and businesses put off creating and using a standardized workstation image. Instead, they use whatever operating system comes pre-configured on the computers they purchase. Sometimes they will install a clean operating system and configure each machine from scratch for each newly purchased computer. This is a mistake which can be both expensive and dangerous. Thankfully, your computer environment can be made more secure, and your IT costs can be reduced, by implementing a standard workstation image.
March 3, 2017 3:45 PM
Thanks to many recent well-known security breaches, a desire has arisen to better understand law firm and professional service organizations’ information network vulnerabilities. What systems are vulnerable? How can we best secure the environment if we don’t know all the vulnerabilities? How can we best secure our data stored in the cloud? How do we know when we’re being hacked? How can we best secure our on-premises infrastructure? How do we secure my general computing environment? Are there systems we don’t even know about – a whole rogue IT infrastructure?
March 3, 2017 3:36 PM
Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhance information security. Read the first two tips here and here.