Client Portal
Support
Contact Us
1.800.541.0450
Request a Free Consultation
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Innovative Insights
U.S. Courts Modify Filing Procedures After SolarWinds Hack
National Tax Security Awareness Week opens with warnings as holidays, 2021 tax season approach
Where Law Firm IT Budgets Should Focus in 2021
⚠️ Advisories for macOS Users
Treasury Department Warning on Ransomware Attacks & Payments
Important Microsoft Windows 10 Licensing Updates
The Benefits of Moving More of Everything to the Cloud for Law Firms
Law Firm Operational Resiliency in an Age of Uncertainty
Citrix Perpetual Licensing Update
Critical HPE Gen10 Server Controller Update Required
iManage Update Required by Oct. 1, 2020
How to Prioritize Your Legal Technology Investments
Visit us at ALA Today!
Law Firm Business Continuity & COVID-19: Results from Our Survey
Law Firm COVID-19 Business Continuity Preparedness Survey
Top Ways to Ensure a Secure Zoom Meeting
AWS WorkSpaces Client Updates Causing Issues
Hackers Take Advantage of COVID-19
Moving Law Firms to the Cloud for Remote Access & Security
Short-Term Remote Access for Clients with On-Premise Systems through COVID-19 Period
Top Clicked Phishing Tests (4Q2019) [Infographic]
Biggest Cybersecurity Risks for the Legal Sector
Spring 2020 Cybersecurity Update Webcast Resources
The 3 W’s of Software Financing
☣ Plan for Coronavirus Impacts
Get the 31 Days of Law Firm Data Security infographic!
31 Days of Law Firm Data Security: Day 31 | Use a Password Manager/Vault
🆓 Generate a CCPA Website Policy Notice — Free!🆓
31 Days of Law Firm Data Security: Day 30 | Auto-Lock
31 Days of Law Firm Data Security: Day 29 | Delete Unused Apps
31 Days of Law Firm Data Security: Day 28 | Outlook Web Access
31 Days of Law Firm Data Security: Day 27 | Pick a Browser
31 Days of Law Firm Data Security: Day 26 | Sensitive Surfing
31 Days of Law Firm Data Security: Day 25 | Overwrite Deleted Data
31 Days of Law Firm Data Security: Day 24 | Delete Unnecessary Data
31 Days of Law Firm Data Security: Bonus App
31 Days of Law Firm Data Security: Day 23 | Spam Filters
31 Days of Law Firm Data Security: Day 22 | Behavior-based Antivirus
31 Days of Law Firm Data Security: Day 21 | Deploy Advanced Endpoint Security
31 Days of Law Firm Data Security: Day 20 | Update
31 Days of Law Firm Data Security: Day 19 | Use 2FA
31 Days of Law Firm Data Security: Day 18 | Use a Password Generator
31 Days of Law Firm Data Security: Day 17 | Password Policies
Critical Vulnerability in Citrix Netscaler
31 Days of Law Firm Data Security: Day 16 | HackNotice
31 Days of Law Firm Data Security: Day 15 | Test Your Password
31 Days of Law Firm Data Security: Day 14 | Privacy Cards
31 Days of Law Firm Data Security: Day 13 | Email Addresses
31 Days of Law Firm Data Security: Day 12
31 Days of Law Firm Data Security: Day 11
31 Days of Law Firm Data Security: Day 10
31 Days of Law Firm Data Security: Day 9 | Auto-lock
31 Days of Law Firm Data Security: Day 8 | Penetration Testing
31 Days of Law Firm Data Security: Day 7 | Security Scans
31 Days of Law Firm Data Security: Day 6 | Digital Dust
31 Days of Law Firm Data Security: Day 5 | Post-Attack Planning
31 Days of Law Firm Data Security: Day 4 | Security Awareness Training
31 Days of Law Firm Data Security: Day 3 | Business Continuity Plan Updates
31 Days of Law Firm Data Security: Day 2 | Cybersecurity Awareness Training
31 Days of Law Firm Data Security: Day 1
Our Most Popular Blog Post of 2019: iManage RAVN
Spring 2020 Cybersecurity Update
Top 5 Blog Posts of 2019: #2 Our 30th Anniversary
Top 5 Blog Posts of 2019: #3 Security Summit Webcast
Top 5 Blog Posts of 2019: #4 Personal Phishing Attack
Don't Let Old Code Hold You Back
Effectively Managing Increasing Client Security Requirements
Three Tech Tips for 2020
Top 5 Blog Posts of 2019: #5 Microsoft EOLs
CCPA Public Hearing Dates and Locations Announced
Compliance is Good for Business
CCPA: Things to Do
Windows 7 Paid Extended Security Updates Announced
The California Consumer Privacy Act of 2018 (CCPA)
New California Consumer Privacy Law Open to Public Comment
Today's Phishing Attack: A Close Call
Do Not Use Microsoft Internet Explorer
What To Expect When Considering the Cloud
Where Should I Store My Data?
Get Your Tickets! iManage ILTA Party @ Epcot World Showplace
Gaps in your Defense: Two-Factor Authentication Bypass Users
Duo Two-Factor Authentication Bypass Mode Advisory
Cyberattacks Down, Costs Up
We're expanding in Austin!
The Top 6 Penetration Testing Fails
8 Steps to Take After a Cyberattack
It's Almost Too Late: Server 2008 End of Life in January
The Window is Closing — Windows 7 End-of-Life is Near
Attack of the EOLs
Security Summit Webcast: The State of Cybersecurity Today and the Law Firm's Standard of Care
Advisory: Microsoft SQL Server 2008 End-of-Life
iManage RAVN: What is it? And what does it mean for law firms?
Innovative Computing Systems Marks 30-Year Anniversary
Enhanced Cybersecurity: Why You Need an MSP
Two More iManage Tips
Two Quick iManage Tips!
iManage Tips: How to Change the View of iManage Folders/Workspaces
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part II
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part I
Performing an Email Mail Merge in Microsoft Word and Excel
6 Business Dynamics Ideal for Cloud Communications
What To Do When Your Email is Compromised
How Phishing Campaigns Targeting Law Firms Have Changed
Email Management for Law Firms: Classifying Emails
Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management
Nobody is Exempt from Cybercrime
Keep Your Law Firm Safer than Atlanta
New Feature: Recipient Checking to Stop Emails Being Sent to the Wrong Person
Reviewing your data protection strategy in 2018
Is Your Firm Secure?
ALERT: Highly Effective Email Phishing Campaign Detected
Beat the Identity Thieves — File Your Taxes Early
Why Law Firms Should Reconsider Purchasing Their Technology
Planning your law firm’s successful move to Office 365
2018 is the year for law firms to seriously consider Office 365
Top 5 Blog Posts of 2017
Cybersecurity and Client Audits Webinar Recording
Top Five Tips for Securing Mobile Devices Before the Holidays
What steps should a legal professional take to tackle an info management challenge?
Five Ways to Prioritize Your Legal Tech Investments (and Get the Most Bang for Your Buck)
Preparing for the Client Audit: Cybersecurity
Johnston Pratt PLLC Selects Innovative Computing Systems as Legal Technology Provider
What You Can Learn from Recent Cyberattacks Targeting School Systems
October is National Cybersecurity Awareness Month
Equifax breach is a reminder of society's larger cybersecurity problems
How Secure Is Your Password?
iManage Work 10: The Next Gen User Experience for Law Firms
Improving the accuracy and efficiency of your information security program
The Equifax Data Breach: What to Do
Windows 10/Server 2016 Start Menu Won’t Open?
Weekly Legal Technology Survey: Hiring 2018
Has your password been stolen?
Cloud Disaster Recovery -- A Panel Discussion
Preparing for the Future of Law Firm Security
Innovative Cloud Solution
Protecting your smartphone from voice impersonators
From Phishing to Smishing
Law Firm Hit by Major Cyberattack
You Need an Action Plan for the GDPR
Meet Your Deadlines with LawToolBox
ISACA 2017 Cybersecurity Study
Cybersecurity Glossary: From botnet to malware — a guide to decoding cybersecurity buzzwords
Fortinet 2017 SMB Preferences Infographic
Two-Factor Authentication: A Password Evolution
The Path to Two-Factor Authentication
Are you in the market?
Do you really know what you're sharing?
The Importance of Document Naming Conventions
We're in Denver at the ALA 2017 Conference & Expo!
Enhanced Information Security | Final Tip!
Enhanced Information Security | Tip #4
eBook: Defining Security for Today's Cloud Environment
Why Workstation Imaging is More Important Than You Think
Top 6 Penetration Testing Fails
Enhanced Information Security | Tip #3
Enhanced Information Security | Tip #2
Enhanced Information Security in Five Quick Steps
5 Ways to Take Your Service Delivery to the Next Level
New Year, New Attitude About Security
Is Hybrid Cloud Storage the Answer for Your Storage?
Proud 2017 Sponsors of Association of Legal Administrators
Recent Phishing Attacks Against Attorneys Highlight Legal’s Ongoing Susceptibility
2016 Reflections
BOLO: Yahoo! Tech Support Scam
Ransomware Targeting Law Firms and How to Defend Your Firm
Needed Legal Technology Skill: Embrace Change
Common Two-Factor Authentication (2FA) Solutions
Update on Cyberattacks Against Law Firms
What is the Cloud and How Are Attorneys Really Using It?
Managing Technology Change in Your Law Firm
The Human Factor in Information Security
Improve Your Law Firm's Security in One Week
You've Been Hacked: Now What?
Our New Office in the East Bay
Our New Threat Map
VMware & AWS: Better Together
Another New Article: The Rise of Ransomware
Preparing for the Client Audit: 6 Tips to Reduce Security Risks
Innovative at ALA Events!
2016 Greater Los Angeles ALA Justice Jog!
Yahoo! Hacked — Change Your Password Now
Security in the Cloud
[INFOGRAPHIC] 5 Common Misperceptions about Email Archiving
Yahoo! Hacked — Reset Your Password Now!
Exceptional Customer Service - 2016 ILTA Technology Purchasing Survey Released
[INFOGRAPHIC] Where is the Best Place to Store Your Data?
[INFOGRAPHIC] 5 Best Practices for Improving Law Firm Security
Want a Ransomware Cyber Guarantee? You Got It!
Pokémon GO Uses “Security Problems!” It’s Super Effective!
Countdown to Contract Expiration: Plan Proactively for Your Law Firm's Phone Changeover
Putting Your Money Where Your Data Is
The Rise of Ransomware (In More Than One Way)
Low Tech with a High Cost
Moving Your Law Firm to the Cloud: A Step-by-Step Guide
Learn more about us in this video
4 ways your small business can embrace innovation
Have you lost control of your BYOD program? Get a handle!
Microsoft SQL Server 2014: It's Time to Migrate
After the Attack: Who Ya Gonna Call?
How K&L Gates Used Attorney Feedback When Selecting a New Global Document Management Solution
All posts
Comment on this post
Recent Posts
Categories
cybersecurity
(126)
IT Tips
(89)
Technology Consulting
(73)
Security
(55)
Cybercrime
(44)
31 Days of Law Firm Data Security
(33)
Cloud
(31)
Training
(31)
Malware
(26)
Information Security
(23)
Passwords
(21)
Email Management
(20)
Email Security
(19)
Ransomware
(18)
Cloud Storage
(17)
phishing
(17)
Alerts
(16)
Hacking
(16)
2FA
(15)
Two Factor Authentication
(15)
Disaster Recovery
(14)
Webinars
(14)
iManage
(14)
Articles
(13)
Data Backups
(12)
Network
(12)
ECM
(11)
Managed Services
(11)
Microsoft
(11)
DMS
(9)
ILTA
(9)
Information Governance
(9)
CCPA
(8)
End of Support
(8)
Endpoint Protection
(8)
Partner Series
(8)
whaling
(8)
Business Continuity
(7)
End of Life
(7)
Office 365
(7)
SentinelOne
(7)
ALA
(6)
Data Recovery
(6)
DocsCorp
(6)
Document Management
(6)
Employment
(6)
Infographic
(6)
Partners
(6)
Privacy
(6)
Access Control
(5)
Antivirus
(5)
COVID-19
(5)
Dual Factor Authentication
(5)
APTs
(4)
Client Audits
(4)
Consumer Privacy
(4)
Cybersecurity Infographic
(4)
Enterprise Mobility Management
(4)
FBI Internet Crime Complaint Center
(4)
Federal Trade Commission
(4)
Innovative Cloud Solution
(4)
Mimecast
(4)
Mobile
(4)
Publications
(4)
Windows 10
(4)
Word
(4)
Cloud Infographic
(3)
Duo
(3)
Events
(3)
Microsoft SQL Server
(3)
Our Team
(3)
PII
(3)
Penetration Testing
(3)
Remote Access
(3)
Secret Service
(3)
Survey
(3)
US-CERT
(3)
Virus
(3)
Windows 7
(3)
Yahoo
(3)
cleanDocs
(3)
iManage Work
(3)
videoconferencing
(3)
ALA 2016
(2)
ALA 2017
(2)
AWS
(2)
Advanced Persistent Threats
(2)
Association of Legal Administrators
(2)
Biometric Authentication
(2)
Change Management
(2)
EOL
(2)
ESU
(2)
Fortinet
(2)
GLA ALA
(2)
HackNotice
(2)
Hashcat
(2)
Hybrid Storage
(2)
IC3
(2)
Identity Theft
(2)
Microsoft SQL Server 2005
(2)
Microsoft SQL Server 2008
(2)
Microsoft SQL Server 2016
(2)
Mine
(2)
Office 2016
(2)
On-Premises Storage
(2)
Regulation
(2)
SMB
(2)
Server 2008
(2)
Staff
(2)
Video
(2)
Videos
(2)
Vulnerability Testing
(2)
firewall
(2)
iManage RVAN
(2)
ABA
(1)
About Us
(1)
Amazon Web Services
(1)
Anniversary
(1)
Austin ALA
(1)
BYOD
(1)
Blue Jeans
(1)
Cindy Bates
(1)
Citadel Information Group
(1)
Citrix
(1)
Cloud Communications
(1)
Customer Service
(1)
David Lam
(1)
ELF
(1)
EMM
(1)
EMP for Windows Server
(1)
Employment Law Forum
(1)
Financing
(1)
First American Equipment Finance
(1)
GLA
(1)
GPDR
(1)
Golden Gate ALA
(1)
HPE
(1)
Hiring
(1)
IBM
(1)
Imaging
(1)
Innovative Computing Systems Family
(1)
Internet Explorer
(1)
Internet of Things
(1)
IoT
(1)
KnowBe4
(1)
LawToolBox
(1)
Licensing
(1)
Los Angeles
(1)
MaaS360
(1)
Michael Kemps
(1)
Microsoft Edge
(1)
Microsoft SQL Server 2014
(1)
Mitel
(1)
Outlook
(1)
PDFs
(1)
Phones
(1)
Pokémon GO
(1)
Printers
(1)
Privacy.com
(1)
RSA Conference
(1)
Recipient Checking
(1)
Servers
(1)
Threat Map
(1)
Unified Communications
(1)
User Experience
(1)
Virtualization
(1)
Work Product Management
(1)
compareDocs
(1)
eBook
(1)
macOS
(1)
pdfDocs
(1)
zoom
(1)
see all
Subscribe to Innovative Insights
Comment on this post