Client Portal
⚠ Technical Alerts
Support
Contact Us
1.800.541.0450
Request a Free Consultation
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Innovative Insights
Introducing Our Partners 8x8
iManage End-of-Life Timeline
Top 15 Most Exploited Vulnerabilities of 2021
Innovative Legal Technology News — Spring 2022
⚠ macOS & iOS Vulnerabilities Require Upgrade
Managing Law Firms' Risks Using Artificial Intelligence
Law Firms Confront Continuing Upheavals, Cybersecurity Threats
Doing Nothing Will Result in 35% Increase in Microsoft Licensing Costs!
Microsoft Pricing Update Effective March 1, 2022
Innovative Legal Technology News - December 2021
⚠ Advisory: Log4j Zero-Day Vulnerability
Innovative in the News
Patch Required for New Vulnerability Affecting Multiple Citrix Products
Legal Professionals: Don't Upgrade to Windows 11 Just Yet
iManage announces the end of life of Filesite, Desksite and IDOL
Fall 2021 Newsletter: iManage EOLs, Cybersecurity Month & ALA 2021
Work Securely: iManage Security Policy Manager, Threat Manager and Records Manager
Work Securely: iManage Business Intake Manager & iManage Conflicts Manager
Work Smarter: iManage Extract & Insight
Proud Inaugural Sponsors of The Successful Firm Project
Work Productively: iManage Closing Folders & Tracker
Didn't Get Hacked in the Last 12 Months? Your Organization is One of the Few
Work Productively: iManage Share
Work Productively: iManage Drive
Work Productively: iManage Work
iManage: Not Just Document Management
⚠️Protect Yourself Against the Windows Print Spooler PrintNightmare Vulnerability
Join us for a Legal Sector Information Security Webinar!
Five Ways to Get the Most from a Managed Service Provider
Cybersecurity Glossary: Networking
Hacking Comes Home: 7 Tips for Data Security for the Remote Workplace
Getting to Know Microsoft Patching
Preparing Your Office for the Return-to-Work
⚠️Active FortiGate Vulnerability Detected
Secure Your Firm's Digital Identities
As Work Went Remote Last Year, Reports of Identity Theft More Than Doubled
iManage Work 10: Documents Not Checking In
Microsoft ZeroLogon Vulnerability Update
Innovative Computing Systems is a Data Privacy Day 2021 Champion
Four Pressing Questions for Innovative’s Top Law Firm IT Security Experts
Top Tech Skills Lawyers Should Develop
World Economic Forum: Cybersecurity Problem No. 1 in COVID-19 Era
U.S. Courts Modify Filing Procedures After SolarWinds Hack
National Tax Security Awareness Week opens with warnings as holidays, 2021 tax season approach
Where Law Firm IT Budgets Should Focus in 2021
⚠️ Advisories for macOS Users
Treasury Department Warning on Ransomware Attacks & Payments
Important Microsoft Windows 10 Licensing Updates
The Benefits of Moving More of Everything to the Cloud for Law Firms
Law Firm Operational Resiliency in an Age of Uncertainty
Citrix Perpetual Licensing Update
Critical HPE Gen10 Server Controller Update Required
iManage Update Required by Oct. 1, 2020
How to Prioritize Your Legal Technology Investments
Visit us at ALA Today!
Law Firm Business Continuity & COVID-19: Results from Our Survey
Law Firm COVID-19 Business Continuity Preparedness Survey
Top Ways to Ensure a Secure Zoom Meeting
AWS WorkSpaces Client Updates Causing Issues
Hackers Take Advantage of COVID-19
Moving Law Firms to the Cloud for Remote Access & Security
Short-Term Remote Access for Clients with On-Premise Systems through COVID-19 Period
Top Clicked Phishing Tests (4Q2019) [Infographic]
Biggest Cybersecurity Risks for the Legal Sector
Spring 2020 Cybersecurity Update Webcast Resources
The 3 W’s of Software Financing
☣ Plan for Coronavirus Impacts
Get the 31 Days of Law Firm Data Security infographic!
31 Days of Law Firm Data Security: Day 31 | Use a Password Manager/Vault
🆓 Generate a CCPA Website Policy Notice — Free!🆓
31 Days of Law Firm Data Security: Day 30 | Auto-Lock
31 Days of Law Firm Data Security: Day 29 | Delete Unused Apps
31 Days of Law Firm Data Security: Day 28 | Outlook Web Access
31 Days of Law Firm Data Security: Day 27 | Pick a Browser
31 Days of Law Firm Data Security: Day 26 | Sensitive Surfing
31 Days of Law Firm Data Security: Day 25 | Overwrite Deleted Data
31 Days of Law Firm Data Security: Day 24 | Delete Unnecessary Data
31 Days of Law Firm Data Security: Bonus App
31 Days of Law Firm Data Security: Day 23 | Spam Filters
31 Days of Law Firm Data Security: Day 22 | Behavior-based Antivirus
31 Days of Law Firm Data Security: Day 21 | Deploy Advanced Endpoint Security
31 Days of Law Firm Data Security: Day 20 | Update
31 Days of Law Firm Data Security: Day 19 | Use 2FA
31 Days of Law Firm Data Security: Day 18 | Use a Password Generator
31 Days of Law Firm Data Security: Day 17 | Password Policies
Critical Vulnerability in Citrix Netscaler
31 Days of Law Firm Data Security: Day 16 | HackNotice
31 Days of Law Firm Data Security: Day 15 | Test Your Password
31 Days of Law Firm Data Security: Day 14 | Privacy Cards
31 Days of Law Firm Data Security: Day 13 | Email Addresses
31 Days of Law Firm Data Security: Day 12
31 Days of Law Firm Data Security: Day 11
31 Days of Law Firm Data Security: Day 10
31 Days of Law Firm Data Security: Day 9 | Auto-lock
31 Days of Law Firm Data Security: Day 8 | Penetration Testing
31 Days of Law Firm Data Security: Day 7 | Security Scans
31 Days of Law Firm Data Security: Day 6 | Digital Dust
31 Days of Law Firm Data Security: Day 5 | Post-Attack Planning
31 Days of Law Firm Data Security: Day 4 | Security Awareness Training
31 Days of Law Firm Data Security: Day 3 | Business Continuity Plan Updates
31 Days of Law Firm Data Security: Day 2 | Cybersecurity Awareness Training
31 Days of Law Firm Data Security: Day 1
Our Most Popular Blog Post of 2019: iManage RAVN
Spring 2020 Cybersecurity Update
Top 5 Blog Posts of 2019: #2 Our 30th Anniversary
Top 5 Blog Posts of 2019: #3 Security Summit Webcast
Top 5 Blog Posts of 2019: #4 Personal Phishing Attack
Don't Let Old Code Hold You Back
Effectively Managing Increasing Client Security Requirements
Three Tech Tips for 2020
Top 5 Blog Posts of 2019: #5 Microsoft EOLs
CCPA Public Hearing Dates and Locations Announced
Compliance is Good for Business
CCPA: Things to Do
Windows 7 Paid Extended Security Updates Announced
The California Consumer Privacy Act of 2018 (CCPA)
New California Consumer Privacy Law Open to Public Comment
Today's Phishing Attack: A Close Call
Do Not Use Microsoft Internet Explorer
What To Expect When Considering the Cloud
Where Should I Store My Data?
Get Your Tickets! iManage ILTA Party @ Epcot World Showplace
Gaps in your Defense: Two-Factor Authentication Bypass Users
Duo Two-Factor Authentication Bypass Mode Advisory
Cyberattacks Down, Costs Up
We're expanding in Austin!
The Top 6 Penetration Testing Fails
8 Steps to Take After a Cyberattack
It's Almost Too Late: Server 2008 End of Life in January
The Window is Closing — Windows 7 End-of-Life is Near
Attack of the EOLs
Security Summit Webcast: The State of Cybersecurity Today and the Law Firm's Standard of Care
Advisory: Microsoft SQL Server 2008 End-of-Life
iManage RAVN: What is it? And what does it mean for law firms?
Innovative Computing Systems Marks 30-Year Anniversary
Enhanced Cybersecurity: Why You Need an MSP
Two More iManage Tips
Two Quick iManage Tips!
iManage Tips: How to Change the View of iManage Folders/Workspaces
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part II
Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part I
Performing an Email Mail Merge in Microsoft Word and Excel
6 Business Dynamics Ideal for Cloud Communications
What To Do When Your Email is Compromised
How Phishing Campaigns Targeting Law Firms Have Changed
Email Management for Law Firms: Classifying Emails
Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management
Nobody is Exempt from Cybercrime
Keep Your Law Firm Safer than Atlanta
New Feature: Recipient Checking to Stop Emails Being Sent to the Wrong Person
Reviewing your data protection strategy in 2018
Is Your Firm Secure?
ALERT: Highly Effective Email Phishing Campaign Detected
Beat the Identity Thieves — File Your Taxes Early
Why Law Firms Should Reconsider Purchasing Their Technology
Planning your law firm’s successful move to Office 365
2018 is the year for law firms to seriously consider Office 365
Top 5 Blog Posts of 2017
Cybersecurity and Client Audits Webinar Recording
Top Five Tips for Securing Mobile Devices Before the Holidays
What steps should a legal professional take to tackle an info management challenge?
Five Ways to Prioritize Your Legal Tech Investments (and Get the Most Bang for Your Buck)
Preparing for the Client Audit: Cybersecurity
Johnston Pratt PLLC Selects Innovative Computing Systems as Legal Technology Provider
What You Can Learn from Recent Cyberattacks Targeting School Systems
October is National Cybersecurity Awareness Month
Equifax breach is a reminder of society's larger cybersecurity problems
How Secure Is Your Password?
iManage Work 10: The Next Gen User Experience for Law Firms
Improving the accuracy and efficiency of your information security program
The Equifax Data Breach: What to Do
Windows 10/Server 2016 Start Menu Won’t Open?
Weekly Legal Technology Survey: Hiring 2018
Has your password been stolen?
Cloud Disaster Recovery -- A Panel Discussion
Preparing for the Future of Law Firm Security
Innovative Cloud Solution
Protecting your smartphone from voice impersonators
From Phishing to Smishing
Law Firm Hit by Major Cyberattack
You Need an Action Plan for the GDPR
Meet Your Deadlines with LawToolBox
ISACA 2017 Cybersecurity Study
Cybersecurity Glossary: From botnet to malware — a guide to decoding cybersecurity buzzwords
Fortinet 2017 SMB Preferences Infographic
Two-Factor Authentication: A Password Evolution
The Path to Two-Factor Authentication
Are you in the market?
Do you really know what you're sharing?
The Importance of Document Naming Conventions
We're in Denver at the ALA 2017 Conference & Expo!
Enhanced Information Security | Final Tip!
Enhanced Information Security | Tip #4
eBook: Defining Security for Today's Cloud Environment
Why Workstation Imaging is More Important Than You Think
Top 6 Penetration Testing Fails
Enhanced Information Security | Tip #3
Enhanced Information Security | Tip #2
Enhanced Information Security in Five Quick Steps
5 Ways to Take Your Service Delivery to the Next Level
All posts
Comment on this post
Recent Posts
Categories
cybersecurity
(147)
IT Tips
(90)
Technology Consulting
(88)
Security
(55)
Cybercrime
(46)
31 Days of Law Firm Data Security
(34)
Training
(34)
Cloud
(31)
Malware
(28)
Information Security
(27)
iManage
(27)
Alerts
(22)
Passwords
(22)
Email Management
(20)
Email Security
(19)
Hacking
(19)
Ransomware
(18)
phishing
(18)
Cloud Storage
(17)
Articles
(16)
2FA
(15)
Document Management
(15)
Microsoft
(15)
Two Factor Authentication
(15)
Webinars
(15)
Disaster Recovery
(14)
Data Backups
(12)
Managed Services
(12)
Network
(12)
ECM
(11)
DMS
(10)
End of Life
(9)
End of Support
(9)
ILTA
(9)
Information Governance
(9)
ALA
(8)
Business Continuity
(8)
CCPA
(8)
Endpoint Protection
(8)
Infographic
(8)
Office 365
(8)
Partner Series
(8)
whaling
(8)
COVID-19
(7)
Partners
(7)
SentinelOne
(7)
Cybersecurity Infographic
(6)
Data Recovery
(6)
DocsCorp
(6)
Employment
(6)
Privacy
(6)
Access Control
(5)
Antivirus
(5)
Dual Factor Authentication
(5)
Federal Trade Commission
(5)
Windows 10
(5)
APTs
(4)
Client Audits
(4)
Consumer Privacy
(4)
EOL
(4)
Enterprise Mobility Management
(4)
FBI Internet Crime Complaint Center
(4)
Innovative Cloud Solution
(4)
Mimecast
(4)
Mobile
(4)
Patching
(4)
Publications
(4)
Remote Access
(4)
Word
(4)
iManage Work
(4)
Cloud Infographic
(3)
Duo
(3)
Events
(3)
Fortinet
(3)
Microsoft SQL Server
(3)
Newsletter
(3)
Our Team
(3)
PII
(3)
Penetration Testing
(3)
SMB
(3)
Secret Service
(3)
Survey
(3)
US-CERT
(3)
Virus
(3)
Vulnerability Testing
(3)
Windows 7
(3)
Work from Home
(3)
Yahoo
(3)
cleanDocs
(3)
videoconferencing
(3)
ALA 2016
(2)
ALA 2017
(2)
AWS
(2)
Advanced Persistent Threats
(2)
Association of Legal Administrators
(2)
BYOD
(2)
Biometric Authentication
(2)
Change Management
(2)
Citrix
(2)
Cloud Communications
(2)
ESU
(2)
GLA ALA
(2)
HackNotice
(2)
Hashcat
(2)
Hybrid Storage
(2)
IC3
(2)
Identity Theft
(2)
Licensing
(2)
Microsoft SQL Server 2005
(2)
Microsoft SQL Server 2008
(2)
Microsoft SQL Server 2016
(2)
Mine
(2)
Office 2016
(2)
On-Premises Storage
(2)
Regulation
(2)
Remote Work
(2)
Server 2008
(2)
Sophos MTR
(2)
Staff
(2)
Unified Communications
(2)
Video
(2)
Videos
(2)
eBook
(2)
firewall
(2)
iManage RVAN
(2)
ABA
(1)
About Us
(1)
Amazon Web Services
(1)
Anniversary
(1)
Apple
(1)
Austin ALA
(1)
Blue Jeans
(1)
Cindy Bates
(1)
Citadel Information Group
(1)
Customer Service
(1)
David Lam
(1)
ELF
(1)
EMM
(1)
EMP for Windows Server
(1)
Employment Law Forum
(1)
Financing
(1)
First American Equipment Finance
(1)
FortiGate
(1)
GLA
(1)
GPDR
(1)
Golden Gate ALA
(1)
HPE
(1)
Hiring
(1)
IBM
(1)
Identity Management
(1)
Imaging
(1)
Innovative Computing Systems Family
(1)
Internet Explorer
(1)
Internet of Things
(1)
IoT
(1)
KnowBe4
(1)
LawToolBox
(1)
Los Angeles
(1)
MaaS360
(1)
Michael Kemps
(1)
Microsoft Edge
(1)
Microsoft SQL Server 2014
(1)
Mitel
(1)
Outlook
(1)
PDFs
(1)
Phones
(1)
Pokémon GO
(1)
Printers
(1)
Privacy.com
(1)
RSA Conference
(1)
Real Estate
(1)
Recipient Checking
(1)
Relocation
(1)
Servers
(1)
Successful Firm Project
(1)
Threat Map
(1)
User Experience
(1)
Virtualization
(1)
VoIP
(1)
Windows 11
(1)
Work Product Management
(1)
compareDocs
(1)
macOS
(1)
pdfDocs
(1)
zoom
(1)
see all
Subscribe to Innovative Insights
News from Our Partner, Sophos
Comment on this post