• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

U.S. Courts Modify Filing Procedures After SolarWinds Hack

National Tax Security Awareness Week opens with warnings as holidays, 2021 tax season approach

Where Law Firm IT Budgets Should Focus in 2021

⚠️ Advisories for macOS Users

Treasury Department Warning on Ransomware Attacks & Payments

Important Microsoft Windows 10 Licensing Updates

The Benefits of Moving More of Everything to the Cloud for Law Firms

Law Firm Operational Resiliency in an Age of Uncertainty

Citrix Perpetual Licensing Update

Critical HPE Gen10 Server Controller Update Required

iManage Update Required by Oct. 1, 2020

How to Prioritize Your Legal Technology Investments

Visit us at ALA Today!

Law Firm Business Continuity & COVID-19: Results from Our Survey

Law Firm COVID-19 Business Continuity Preparedness Survey

Top Ways to Ensure a Secure Zoom Meeting

AWS WorkSpaces Client Updates Causing Issues

Hackers Take Advantage of COVID-19

Moving Law Firms to the Cloud for Remote Access & Security

Short-Term Remote Access for Clients with On-Premise Systems through COVID-19 Period

Top Clicked Phishing Tests (4Q2019) [Infographic]

Biggest Cybersecurity Risks for the Legal Sector

Spring 2020 Cybersecurity Update Webcast Resources

The 3 W’s of Software Financing

☣ Plan for Coronavirus Impacts

Get the 31 Days of Law Firm Data Security infographic!

31 Days of Law Firm Data Security: Day 31 | Use a Password Manager/Vault

🆓 Generate a CCPA Website Policy Notice — Free!🆓

31 Days of Law Firm Data Security: Day 30 | Auto-Lock

31 Days of Law Firm Data Security: Day 29 | Delete Unused Apps

31 Days of Law Firm Data Security: Day 28 | Outlook Web Access

31 Days of Law Firm Data Security: Day 27 | Pick a Browser

31 Days of Law Firm Data Security: Day 26 | Sensitive Surfing

31 Days of Law Firm Data Security: Day 25 | Overwrite Deleted Data

31 Days of Law Firm Data Security: Day 24 | Delete Unnecessary Data

31 Days of Law Firm Data Security: Bonus App

31 Days of Law Firm Data Security: Day 23 | Spam Filters

31 Days of Law Firm Data Security: Day 22 | Behavior-based Antivirus

31 Days of Law Firm Data Security: Day 21 | Deploy Advanced Endpoint Security

31 Days of Law Firm Data Security: Day 20 | Update

31 Days of Law Firm Data Security: Day 19 | Use 2FA

31 Days of Law Firm Data Security: Day 18 | Use a Password Generator

31 Days of Law Firm Data Security: Day 17 | Password Policies

Critical Vulnerability in Citrix Netscaler

31 Days of Law Firm Data Security: Day 16 | HackNotice

31 Days of Law Firm Data Security: Day 15 | Test Your Password

31 Days of Law Firm Data Security: Day 14 | Privacy Cards

31 Days of Law Firm Data Security: Day 13 | Email Addresses

31 Days of Law Firm Data Security: Day 12

31 Days of Law Firm Data Security: Day 11

31 Days of Law Firm Data Security: Day 10

31 Days of Law Firm Data Security: Day 9 | Auto-lock

31 Days of Law Firm Data Security: Day 8 | Penetration Testing

31 Days of Law Firm Data Security: Day 7 | Security Scans

31 Days of Law Firm Data Security: Day 6 | Digital Dust

31 Days of Law Firm Data Security: Day 5 | Post-Attack Planning

31 Days of Law Firm Data Security: Day 4 | Security Awareness Training

31 Days of Law Firm Data Security: Day 3 | Business Continuity Plan Updates

31 Days of Law Firm Data Security: Day 2 | Cybersecurity Awareness Training

31 Days of Law Firm Data Security: Day 1

Our Most Popular Blog Post of 2019: iManage RAVN

Spring 2020 Cybersecurity Update

Top 5 Blog Posts of 2019: #2 Our 30th Anniversary

Top 5 Blog Posts of 2019: #3 Security Summit Webcast

Top 5 Blog Posts of 2019: #4 Personal Phishing Attack

Don't Let Old Code Hold You Back

Effectively Managing Increasing Client Security Requirements

Three Tech Tips for 2020

Top 5 Blog Posts of 2019: #5 Microsoft EOLs

CCPA Public Hearing Dates and Locations Announced

Compliance is Good for Business

CCPA: Things to Do

Windows 7 Paid Extended Security Updates Announced

The California Consumer Privacy Act of 2018 (CCPA)

New California Consumer Privacy Law Open to Public Comment

Today's Phishing Attack: A Close Call

Do Not Use Microsoft Internet Explorer

What To Expect When Considering the Cloud

Where Should I Store My Data?

Get Your Tickets! iManage ILTA Party @ Epcot World Showplace

Gaps in your Defense: Two-Factor Authentication Bypass Users

Duo Two-Factor Authentication Bypass Mode Advisory

Cyberattacks Down, Costs Up

We're expanding in Austin!

The Top 6 Penetration Testing Fails

8 Steps to Take After a Cyberattack

It's Almost Too Late: Server 2008 End of Life in January

The Window is Closing — Windows 7 End-of-Life is Near

Attack of the EOLs

Security Summit Webcast: The State of Cybersecurity Today and the Law Firm's Standard of Care

Advisory: Microsoft SQL Server 2008 End-of-Life

iManage RAVN: What is it? And what does it mean for law firms?

Innovative Computing Systems Marks 30-Year Anniversary

Enhanced Cybersecurity: Why You Need an MSP

Two More iManage Tips

Two Quick iManage Tips!

iManage Tips: How to Change the View of iManage Folders/Workspaces

Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part II

Eight Factors to Consider Before Migrating Your Law Firm to Microsoft Office 365, Part I

Performing an Email Mail Merge in Microsoft Word and Excel

6 Business Dynamics Ideal for Cloud Communications

What To Do When Your Email is Compromised

How Phishing Campaigns Targeting Law Firms Have Changed

Email Management for Law Firms: Classifying Emails

Mimecast and Microsoft Office Play Nice Together for Law Firm Email Management

Nobody is Exempt from Cybercrime

Keep Your Law Firm Safer than Atlanta

New Feature: Recipient Checking to Stop Emails Being Sent to the Wrong Person

Reviewing your data protection strategy in 2018

Is Your Firm Secure?

ALERT: Highly Effective Email Phishing Campaign Detected

Beat the Identity Thieves — File Your Taxes Early

Why Law Firms Should Reconsider Purchasing Their Technology

Planning your law firm’s successful move to Office 365

2018 is the year for law firms to seriously consider Office 365

Top 5 Blog Posts of 2017

Cybersecurity and Client Audits Webinar Recording

Top Five Tips for Securing Mobile Devices Before the Holidays

What steps should a legal professional take to tackle an info management challenge?

Five Ways to Prioritize Your Legal Tech Investments (and Get the Most Bang for Your Buck)

Preparing for the Client Audit: Cybersecurity

Johnston Pratt PLLC Selects Innovative Computing Systems as Legal Technology Provider

What You Can Learn from Recent Cyberattacks Targeting School Systems

October is National Cybersecurity Awareness Month

Equifax breach is a reminder of society's larger cybersecurity problems

How Secure Is Your Password?

iManage Work 10: The Next Gen User Experience for Law Firms

Improving the accuracy and efficiency of your information security program

The Equifax Data Breach: What to Do

Windows 10/Server 2016 Start Menu Won’t Open?

Weekly Legal Technology Survey: Hiring 2018

Has your password been stolen?

Cloud Disaster Recovery -- A Panel Discussion

Preparing for the Future of Law Firm Security

Innovative Cloud Solution

Protecting your smartphone from voice impersonators

From Phishing to Smishing

Law Firm Hit by Major Cyberattack

You Need an Action Plan for the GDPR

Meet Your Deadlines with LawToolBox

ISACA 2017 Cybersecurity Study

Cybersecurity Glossary: From botnet to malware — a guide to decoding cybersecurity buzzwords

Fortinet 2017 SMB Preferences Infographic

Two-Factor Authentication: A Password Evolution

The Path to Two-Factor Authentication

Are you in the market?

Do you really know what you're sharing?

The Importance of Document Naming Conventions

We're in Denver at the ALA 2017 Conference & Expo!

Enhanced Information Security | Final Tip!

Enhanced Information Security | Tip #4

eBook: Defining Security for Today's Cloud Environment

Why Workstation Imaging is More Important Than You Think

Top 6 Penetration Testing Fails

Enhanced Information Security | Tip #3

Enhanced Information Security | Tip #2

Enhanced Information Security in Five Quick Steps

5 Ways to Take Your Service Delivery to the Next Level

New Year, New Attitude About Security

Is Hybrid Cloud Storage the Answer for Your Storage?

Proud 2017 Sponsors of Association of Legal Administrators

Recent Phishing Attacks Against Attorneys Highlight Legal’s Ongoing Susceptibility

2016 Reflections

BOLO: Yahoo! Tech Support Scam

Ransomware Targeting Law Firms and How to Defend Your Firm

Needed Legal Technology Skill: Embrace Change

Common Two-Factor Authentication (2FA) Solutions

Update on Cyberattacks Against Law Firms

What is the Cloud and How Are Attorneys Really Using It?

Managing Technology Change in Your Law Firm

The Human Factor in Information Security

Improve Your Law Firm's Security in One Week

You've Been Hacked: Now What?

Our New Office in the East Bay

Our New Threat Map

VMware & AWS: Better Together

Another New Article: The Rise of Ransomware

Preparing for the Client Audit: 6 Tips to Reduce Security Risks

Innovative at ALA Events!

2016 Greater Los Angeles ALA Justice Jog!

Yahoo! Hacked — Change Your Password Now

Security in the Cloud

[INFOGRAPHIC] 5 Common Misperceptions about Email Archiving

Yahoo! Hacked — Reset Your Password Now!

Exceptional Customer Service - 2016 ILTA Technology Purchasing Survey Released

[INFOGRAPHIC] Where is the Best Place to Store Your Data?

[INFOGRAPHIC] 5 Best Practices for Improving Law Firm Security

Want a Ransomware Cyber Guarantee? You Got It!

Pokémon GO Uses “Security Problems!” It’s Super Effective!

Countdown to Contract Expiration: Plan Proactively for Your Law Firm's Phone Changeover

Putting Your Money Where Your Data Is

The Rise of Ransomware (In More Than One Way)

Low Tech with a High Cost

Moving Your Law Firm to the Cloud: A Step-by-Step Guide

Learn more about us in this video

4 ways your small business can embrace innovation

Have you lost control of your BYOD program? Get a handle!

Microsoft SQL Server 2014: It's Time to Migrate

After the Attack: Who Ya Gonna Call?

How K&L Gates Used Attorney Feedback When Selecting a New Global Document Management Solution

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (126)
  • IT Tips (89)
  • Technology Consulting (73)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Cloud (31)
  • Training (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Business Continuity (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • COVID-19 (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.