January 8, 2020 4:15 AM
January 7, 2020 2:30 AM
January 6, 2020 4:15 AM
January 5, 2020 12:45 AM
January 4, 2020 12:15 AM
January 3, 2020 12:15 AM
January 2, 2020 12:15 AM
January 1, 2020 3:00 AM
With the dawn of the new year we begin a month-long blog series to help you secure your technology in 2020. Every day this month, we'll suggest one quick tip you can employ to enhance your security.
December 19, 2019 2:30 PM
Our most popular blog post this year was a look at our long-time partner iManage's RAVN software. With an eye toward its usefulness for legal professionals, senior consultant Brian Piatek explained what the software does:
December 16, 2019 4:57 PM
Join Mike Paul, Chief Technology Officer of Innovative Computing Systems, Inc., on February 25, 2020, for a Spring 2020 Cybersecurity Update webinar.
December 16, 2019 2:24 PM
In our second most popular blog post this year, we celebrated our 30th anniversary by reflecting on the changes we've seen in the legal technology industry since Innovative Computing Systems opened for business.
December 12, 2019 4:24 PM
In mid-2019, we held our first online security summit bringing together legal, cybersecurity and IT professionals to discuss law firms' responsibility to manage cybersecurity, including risk management, potential future threats and steps firms should take to ensure the security of their firms' and clients' data. Our third most popular blog post from 2019 was the invitation to the summit.
December 10, 2019 5:44 PM
Our fourth most popular blog of 2019 falls outside the strict theme of "business continuity" as it was a recount of a personal phishing attack I experienced (and have experienced again since). Nonetheless, it is just these personal attacks that lead to cybersecurity breaches of larger organizations. In fact, cybercriminals are often able to reuse the credentials they discover in successful cyberattacks against individuals' personal data to access corporate and other accounts.
December 6, 2019 1:07 PM
Some organizations confront a seemingly insurmountable obstacle when trying to migrate to updated systems: a key legacy application simply won't work on a new operating system. This can happen for a number of reasons, including the application requiring dependencies based on a specific version of Windows Server or the installation media or source code being lost. Fortunately, we've overcome that problem.
December 6, 2019 12:44 PM
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the personally identifiable information to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.