Request a Free Consultation
News & Events
Get Your Tickets! iManage ILTA Party @ Epcot World Showplace
Gaps in your Defense: Two-Factor Authentication Bypass Users
Duo Two-Factor Authentication Bypass Mode Advisory
Cyberattacks Down, Costs Up
We're expanding in Austin!
The Top 6 Penetration Testing Fails
8 Steps to Take After a Cyberattack
It's Almost Too Late: Server 2008 End of Life in January
The Window is Closing — Windows 7 End-of-Life is Near
Attack of the EOLs
Security Summit Webcast: The State of Cybersecurity Today and the Law Firm's Standard of Care
Advisory: Microsoft SQL Server 2008 End-of-Life
iManage RAVN: What is it? And what does it mean for law firms?
Innovative Computing Systems Marks 30-Year Anniversary
Enhanced Cybersecurity: Why You Need an MSP
Two More iManage Tips
Two Quick iManage Tips!
iManage Tips: How to Change the View of iManage Folders/Workspaces
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part II
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part I
Performing an Email Mail Merge in Microsoft Word and Excel
6 Business Dynamics Ideal for Cloud Communications
What To Do When Your Email is Compromised
How Phishing Campaigns Targeting Law Firms Have Changed
Email Management for Law Firms: Classifying Emails
Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management
Nobody is Exempt from Cybercrime
Keep Your Law Firm Safer than Atlanta
New Feature: Recipient Checking to Stop Emails Being Sent to the Wrong Person
Reviewing your data protection strategy in 2018
Is Your Firm Secure?
ALERT: Highly Effective Email Phishing Campaign Detected
Beat the Identity Thieves — File Your Taxes Early
Why Law Firms Should Reconsider Purchasing Their Technology
Planning your law firm’s successful move to Office 365
2018 is the year for law firms to seriously consider Office 365
Top 5 Blog Posts of 2017
Cybersecurity and Client Audits Webinar Recording
Top Five Tips for Securing Mobile Devices Before the Holidays
What steps should a legal professional take to tackle an info management challenge?
Five Ways to Prioritize Your Legal Tech Investments (and Get the Most Bang for Your Buck)
Preparing for the Client Audit: Cybersecurity
Johnston Pratt PLLC Selects Innovative Computing Systems as Legal Technology Provider
What You Can Learn from Recent Cyberattacks Targeting School Systems
October is National Cybersecurity Awareness Month
Equifax breach is a reminder of society's larger cybersecurity problems
How Secure Is Your Password?
iManage Work 10: The Next Gen User Experience for Law Firms
Improving the accuracy and efficiency of your information security program
The Equifax Data Breach: What to Do
Windows 10/Server 2016 Start Menu Won’t Open?
Weekly Legal Technology Survey: Hiring 2018
Has your password been stolen?
Cloud Disaster Recovery -- A Panel Discussion
Preparing for the Future of Law Firm Security
Innovative Cloud Solution
Protecting your smartphone from voice impersonators
From Phishing to Smishing
Law Firm Hit by Major Cyberattack
You Need an Action Plan for the GDPR
Meet Your Deadlines with LawToolBox
ISACA 2017 Cybersecurity Study
Cybersecurity Glossary: From botnet to malware — a guide to decoding cybersecurity buzzwords
Fortinet 2017 SMB Preferences Infographic
Two-Factor Authentication: A Password Evolution
The Path to Two-Factor Authentication
Are you in the market?
Do you really know what you're sharing?
The Importance of Document Naming Conventions
We're in Denver at the ALA 2017 Conference & Expo!
Enhanced Information Security | Final Tip!
Enhanced Information Security | Tip #4
How to Build a Holistic Information Security Program
eBook: Defining Security for Today's Cloud Environment
Why Workstation Imaging is More Important Than You Think
Top 6 Penetration Testing Fails
Enhanced Information Security | Tip #3
Enhanced Information Security | Tip #2
Enhanced Information Security in Five Quick Steps
5 Ways to Take Your Service Delivery to the Next Level
New Year, New Attitude About Security
Is Hybrid Cloud Storage the Answer for Your Storage?
Proud 2017 Sponsors of Association of Legal Administrators
Recent Phishing Attacks Against Attorneys Highlight Legal’s Ongoing Susceptibility
BOLO: Yahoo! Tech Support Scam
Ransomware Targeting Law Firms and How to Defend Your Firm
Needed Legal Technology Skill: Embrace Change
Common Two-Factor Authentication (2FA) Solutions
Update on Cyberattacks Against Law Firms
What is the Cloud and How Are Attorneys Really Using It?
Managing Technology Change in Your Law Firm
The Human Factor in Information Security
Improve Your Law Firm's Security in One Week
You've Been Hacked: Now What?
Our New Office in the East Bay
Our New Threat Map
Law Firm Security Must Rapidly Embrace Cybersecurity Controls for the Sake of their Clients
VMware & AWS: Better Together
Another New Article: The Rise of Ransomware
Preparing for the Client Audit: 6 Tips to Reduce Security Risks
Innovative at ALA Events!
2016 Greater Los Angeles ALA Justice Jog!
Yahoo! Hacked — Change Your Password Now
Security in the Cloud
[INFOGRAPHIC] 5 Common Misperceptions about Email Archiving
Yahoo! Hacked — Reset Your Password Now!
Exceptional Customer Service - 2016 ILTA Technology Purchasing Survey Released
[INFOGRAPHIC] Where is the Best Place to Store Your Data?
[INFOGRAPHIC] 5 Best Practices for Improving Law Firm Security
Want a Ransomware Cyber Guarantee? You Got It!
Pokémon GO Uses “Security Problems!” It’s Super Effective!
Countdown to Contract Expiration: Plan Proactively for Your Law Firm's Phone Changeover
Putting Your Money Where Your Data Is
The Rise of Ransomware (In More Than One Way)
Low Tech with a High Cost
Moving Your Law Firm to the Cloud: A Step-by-Step Guide
Learn more about us in this video
4 ways your small business can embrace innovation
Innovative Computing Systems @ ALA 2016
Have you lost control of your BYOD program? Get a handle!
Microsoft SQL Server 2014: It's Time to Migrate
After the Attack: Who Ya Gonna Call?
How K&L Gates Used Attorney Feedback When Selecting a New Global Document Management Solution
Law Firm Data: Safer in the Cloud
A CryptoLocker Checklist for Law Firms
And for our next trick . . .
Greater LA Chapter of ALA Employment Law Forum Another Success!
Law Firm Cybersecurity Tips: Advanced Persistent Threats
The Meaning of the RSA Conference
End-of-Support for Microsoft SQL Server 2005 is April 12th! Upgrade Now!
Law Firm Cybersecurity Tips: Phishing and Whaling
Email Security: Not Just IT's Problem
Law Firm Cybersecurity Tips: Law Firms and Security Education
Law Firm Cybersecurity Tips: Don't Just Set It and Forget It
Law Firm Cybersecurity Tips: Hashcat* Will Eat Your Long Passwords
Latest Features: iManage 9.3 — Complimentary Webinar
Don't Let Your Law Firm Become Whale Bait
Hardening Your Computer – Decrease Your Vulnerability Footprint
How to Choose Email Filtering (aka Email Hygiene) Solutions for Your Law Firm
pdfDocs — Versatility, Flexibility and Familiarity
Turn On New Mimecast Email Security Features
A Legal Administrators’ Guide to Choosing a Business VoIP Phone System
Evaluating and Selecting the 4 Most Important Facets of Network Technologies for Your Law Firm
Compare, Clean, Then Send — Free Webinar with DocsCorp
Information Governance & the Law Firm Technology that Supports It
2016 Resolution — Keep Your Inbox Clean
Controlling Access to Confidential Law Firm Content
Top 5 Legal Tech Developments in 2015
'Tis the Season for Holiday Parties and Peer Awards
We've Teamed with Blue Jeans to Bring Law Firms Next Generation Videoconferencing
So Your SAN is Full . . .
All Products Come to Their End
Coolest Tech from 2015
Planning Like It's 1999
Tech Tip Tuesday: How to Use Windows 10 Aero
DocsCorp Knows Where You Put Your Content Last Summer
Does Your Law Firm Need Locks or a Security Guard?
Another week, another new face: Welcome, Mercedes!
Tech Tip Tuesday: Perch Your Android Phone for Security
Case Study: A Town Held Hostage by the Cryptolocker Virus
Innovative Legal Tech and Ed Tech
Welcome aboard, Julie!
Tech Tip Tuesday: Are You Still Installing Windows Server 2008 at Your Law Firm?
Tech Tip Tuesday: Taking in the View of Patents
We Value Our Partners
Tech Tip Tuesday: Who Cares About Our Law Firm Security? I Want My Stuff!
Crowther: What Microsoft Office 2016 Means to Law Firms
Tech Tip Tuesday: Securing Your Home Internet of Things
Alert: iManage Identifies MS Office 2010 Bug
Tech Tip Tuesday: Verizon iPhone 6 & 6 Plus Users Get HD Calls and More with VoLTE on 4G
Back to Work: ILTACON 2015 is Over
Tech Tip Tuesday: Use VIPs to Filter Your Mail on iPhone or iPad
Get Out of Your Bubble: Making the Most of ILTACON 2015
Tech Tip Tuesday: Searching in iManage
Windows 10: Shiny New Toy?
The Importance of Upgrades
Tech Tip Tuesday: How to Add Items to My Favorites in FileSite or DeskSite
Innovative Computing Systems, Inc., Expands Executive Team
Tech Tip Tuesday: Shore Up Your Encryption and Password Policy
5 Things Every Managed Services Provider Should Provide Your Law Firm
Tech Tip Tuesday: Name Files Methodically
Adobe Type Manager Alert
Tech Tip Tuesday: PowerPoint's Presenter View
Tech Tip Tuesday: Secrets of WorkSite IDOL Searching
Critical Adobe Flash Player Plug-in Vulnerability
Innovative Computing Systems is Gold Sponsor of ILTACON 2015
Tech Tip Tuesday: How to Customize Column Headings in FileSite
We're Looking for Technical Support Engineers in Austin!
Tech Tip Tuesday: Format All Excel Sheet Tabs at Once
Hardening Your Computer - Decrease Your Law Firm's Vulnerability Footprint
Protecting Your Law Firm from Inside Security Threats
Utilizing Windows Built-In Security at Law Firms
What’s your law firm’s plan for safe file storage?
Legal IT Logistics: How to Move your Law Firm
Attend our free webinar on Law Firm Security: The Current State of Malware and its Impact on Your Firm
Law Firm IT Tips: Do not Fear IDOL
Social Engineering, Security and Law Firms – A few thoughts to protect yourself and your firm
Tech Maintenance in Law Firms - The Importance of the Maintenance Window
Cloud-Based Backups for Law Firm Data – Your last line of defense
Office 365 and Large Mailboxes: Moving Law Firm Mail Data to the Cloud
Passphrases - Move Away from Overcomplicated Passwords for Better Security at Your Law Firm
Law Firm Security: The Current State of Malware and its Impact on Your Firm
Law Firms and Their BYOD Policy
Moving a law firm infrastructure to the cloud – 5 ways to get your feet wet
Announcing the launch of our Consulting Practice Group
Security Awareness Training In Law Firms — What you need to know
Law Firm Data Security: Handling Malware
Comment on this post
Two Factor Authentication
Dual Factor Authentication
End of Life
End of Support
Enterprise Mobility Management
FBI Internet Crime Complaint Center
Federal Trade Commission
Microsoft SQL Server
Advanced Persistent Threats
Association of Legal Administrators
Innovative Computing Systems Family
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft SQL Server 2016
Amazon Web Services
Citadel Information Group
Employment Law Forum
Golden Gate ALA
Internet of Things
Microsoft SQL Server 2014
Work Product Management
Subscribe to Innovative Insights
Managed IT Services
Enterprise Servers & Storage
Enterprise Content Management
Telephony & Networking
Audits & Strategy
News & Events
1989-2019. Innovative Computing Systems, Inc.