• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Top Ways to Ensure a Secure Zoom Meeting

Posted by William Pate

April 2, 2020 11:07 AM

  • Tweet

As thousands of people begin using Zoom for videoconferencing from home for the first time under the coronavirus threat, we thought some guidance on ensuring your meetings are secure might come in handy.

Read More

Topics: videoconferencing, cybersecurity, COVID-19, Remote Access, zoom

AWS WorkSpaces Client Updates Causing Issues

Posted by William Pate

March 23, 2020 11:52 AM

  • Tweet

Amazon has continued issuing updates to their AWS WorkSpaces client on workstations and thin clients that result in instability for users. We have received a number of reports from clients experiencing a variety of performance issues upon installing the latest AWS WorkSpaces client update over the weekend. This includes Windows and Mac operating systems.

Read More

Topics: Alerts, AWS

Hackers Take Advantage of COVID-19

Posted by William Pate

March 20, 2020 9:38 AM

  • Tweet

Hackers are taking advantage of the confusion surrounding the novel coronavirus pandemic. 

Read More

Topics: Alerts, Webinars, cybersecurity, Cybersecurity Infographic, COVID-19

Moving Law Firms to the Cloud for Remote Access & Security

Posted by William Pate

March 18, 2020 10:28 AM

  • Tweet

We've been encouraging law firms and legal professionals to take advantage of the benefits offered by moving to the cloud for a few years now. We're such big believers that we invested significant research and development in designing a legal-focused cloud solution, the Innovative Cloud Solution, that gives employees of firms of all sizes the power to access and work safely from anywhere. Recent events have highlighted how businesses operating in the cloud have a competitive advantage over those still tied to an office.

Read More

Topics: Cloud, ILTA, cybersecurity, Cloud Infographic, Articles, Innovative Cloud Solution, Remote Access

Short-Term Remote Access for Clients with On-Premise Systems through COVID-19 Period

Posted by Michael Kemps

March 12, 2020 3:45 PM

  • Tweet

Yesterday, the World Health Organization formally characterized COVID-19 as a pandemic. In light of this, there is an unprecedented move by employers to reduce the spread of the virus by turning to remote options for their employees.

Read More

Topics: COVID-19, Remote Access

Top Clicked Phishing Tests (4Q2019) [Infographic]

Posted by William Pate

March 10, 2020 9:09 AM

  • Tweet

Check out what hackers are using to trick employees into clicking fake links in emails in our partner KnowBe4's review of the Top Clicked Phishing Tests from the last quarter of 2019 in the below infographic. 

Read More

Topics: cybersecurity, Infographic, phishing, KnowBe4

Biggest Cybersecurity Risks for the Legal Sector

Posted by Summer Westfield

March 3, 2020 2:40 PM

  • Tweet

The term "attorney-client privilege," often heard in crime procedurals on TV, speaks of the level of confidentiality that exists in the legal sector. Due to the nature of their work protecting organizations and individuals, law firms receive and handle some of the most sensitive information in the world. Unfortunately, this makes them a prime target for hackers who want to infiltrate their networks and steal that information. The goal of these cybercriminals is usually to sell that data to interested parties or to restrict access to their targets’ own networks, which for law firms can be crippling.

Since 2014, an investigation revealed that over 100 law firms have notified authorities of data breaches, and this number only encompasses 14 states. Major law firms, mid-size firms, solo practitioners, and even law schools were affected by these attacks, which goes to show that no one is safe from cyber crime. Given its scope, a good place to start mitigating the issue is by identifying the biggest risks. Here are the leading cybersecurity threats that law professionals should know:

Read More

Topics: cybersecurity

Spring 2020 Cybersecurity Update Webcast Resources

Posted by William Pate

February 25, 2020 3:19 PM

  • Tweet

If you missed our Spring 2020 Cybersecurity Update today, you can watch the recording here. 

Read More

Topics: cybersecurity

The 3 W’s of Software Financing

Posted by William Pate

February 25, 2020 11:36 AM

  • Tweet

We're pleased to share this blog post from our partners at First American Equipment Finance. 

 

Read More

Topics: First American Equipment Finance, Financing

☣ Plan for Coronavirus Impacts

Posted by William Pate

February 19, 2020 4:45 PM

  • Tweet

In an effort to keep you abreast of ongoing developments that could impact your firm's technology, we wanted to alert you to increasing likelihood of disruptions to major IT manufacturers' supply chains due to the Coronavirus outbreak in Asia.

Read More

Topics: Security, Technology Consulting, IT Tips, Alerts, Disaster Recovery

Get the 31 Days of Law Firm Data Security infographic!

Posted by William Pate

February 1, 2020 11:13 AM

  • Tweet

To kick off 2020, we published a new cybersecurity tip each day of January. 

Read More

Topics: CCPA, 31 Days of Law Firm Data Security, Consumer Privacy, Mine

31 Days of Law Firm Data Security: Day 31 | Use a Password Manager/Vault

Posted by William Pate

January 31, 2020 12:15 AM

  • Tweet

Use a password manager.

Read More

Topics: cybersecurity, Passwords, 31 Days of Law Firm Data Security

🆓 Generate a CCPA Website Policy Notice — Free!🆓

Posted by William Pate

January 30, 2020 10:22 AM

  • Tweet

As our 31 Days of Law Firm Data Security winds down, we wanted to remind readers of the free California Consumer Privacy Act website policy notice generator offered by iubenda.   

Read More

Topics: CCPA, Privacy, Regulation, Consumer Privacy

31 Days of Law Firm Data Security: Day 30 | Auto-Lock

Posted by William Pate

January 30, 2020 12:30 AM

  • Tweet

Set your devices to auto-lock.

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 29 | Delete Unused Apps

Posted by William Pate

January 29, 2020 12:00 AM

  • Tweet

Delete old programs and apps.

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

Previous All posts Next

Comment on this post

Recent Posts

Categories

  • cybersecurity (126)
  • IT Tips (89)
  • Technology Consulting (73)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Cloud (31)
  • Training (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Business Continuity (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • COVID-19 (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.