Innovative Insights — Innovative Computing Systems https://www.innovativecomp.com/blog The Blog of Innovative Computing Systems en-us Fri, 30 Sep 2022 19:36:32 GMT 2022-09-30T19:36:32Z en-us ⚠ 2 Zero-Day Vulnerabilities in Microsoft Exchange Server https://www.innovativecomp.com/blog/2-zero-day-vulnerabilities-in-microsoft-exchange-server <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/2-zero-day-vulnerabilities-in-microsoft-exchange-server" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/alert_icon.jpg" alt="⚠ 2 Zero-Day Vulnerabilities in Microsoft Exchange Server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 125%;">Microsoft has reported two new vulnerabilities (CVE-2022-41040 &amp; CVE-2022-41082) affecting on-premises Microsoft Exchange Server 2013, 2016, and 2019.<br><br>Microsoft has observed limited, targeted attacks exploiting these vulnerabilities to compromise target systems.<br><br>Mitigations for this vulnerability are available; however, a patch is not available at this time.<br><br>CVE-2022-41040 is a Server-Side Request Forgery (SSRF) vulnerability while CVE-2022-41082 is a Remote Code Execution (RCE) vulnerability.<br><br>Vulnerabilities of this nature have been exploited in the past (such as with ProxyShell) to deliver web shells and perform further attacks including lateral movement within target networks and delivery of malicious payloads (such as ransomware).&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/2-zero-day-vulnerabilities-in-microsoft-exchange-server" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/alert_icon.jpg" alt="⚠ 2 Zero-Day Vulnerabilities in Microsoft Exchange Server" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="line-height: 125%;">Microsoft has reported two new vulnerabilities (CVE-2022-41040 &amp; CVE-2022-41082) affecting on-premises Microsoft Exchange Server 2013, 2016, and 2019.<br><br>Microsoft has observed limited, targeted attacks exploiting these vulnerabilities to compromise target systems.<br><br>Mitigations for this vulnerability are available; however, a patch is not available at this time.<br><br>CVE-2022-41040 is a Server-Side Request Forgery (SSRF) vulnerability while CVE-2022-41082 is a Remote Code Execution (RCE) vulnerability.<br><br>Vulnerabilities of this nature have been exploited in the past (such as with ProxyShell) to deliver web shells and perform further attacks including lateral movement within target networks and delivery of malicious payloads (such as ransomware).&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2F2-zero-day-vulnerabilities-in-microsoft-exchange-server&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Technology Consulting Alerts cybersecurity Microsoft Fri, 30 Sep 2022 19:36:32 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/2-zero-day-vulnerabilities-in-microsoft-exchange-server 2022-09-30T19:36:32Z Litera & iManage End-of-Life Information https://www.innovativecomp.com/blog/litera-imanage-end-of-life-information <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/litera-imanage-end-of-life-information" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Litera%20and%20iManage%20Video.png" alt="Litera &amp; iManage End-of-Life Information" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Litera recently created a video we believe you will find informative and helpful in planning for the many upcoming end-of-life dates for iManage and related solutions (e.g., cleanDocs, compareDocs, MS Server 2012R2, MS Basic Authentication). The video also speaks to the benefits of moving to iManage Cloud.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/litera-imanage-end-of-life-information" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Litera%20and%20iManage%20Video.png" alt="Litera &amp; iManage End-of-Life Information" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Litera recently created a video we believe you will find informative and helpful in planning for the many upcoming end-of-life dates for iManage and related solutions (e.g., cleanDocs, compareDocs, MS Server 2012R2, MS Basic Authentication). The video also speaks to the benefits of moving to iManage Cloud.</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Flitera-imanage-end-of-life-information&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> iManage Infographic End of Support End of Life EOL Litera Thu, 22 Sep 2022 19:15:58 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/litera-imanage-end-of-life-information 2022-09-22T19:15:58Z October is Cybersecurity Awareness Month. Are You Prepared? https://www.innovativecomp.com/blog/october-is-cybersecurity-awareness-month.-are-you-prepared <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/october-is-cybersecurity-awareness-month.-are-you-prepared" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/cam1.jpg" alt="Get Your Cybersecurity Awareness Month Kit!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Cybersecurity Awareness Month is a great time to educate yourself and your users.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/october-is-cybersecurity-awareness-month.-are-you-prepared" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/cam1.jpg" alt="Get Your Cybersecurity Awareness Month Kit!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Cybersecurity Awareness Month is a great time to educate yourself and your users.</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Foctober-is-cybersecurity-awareness-month.-are-you-prepared&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security cybersecurity Cybercrime KnowBe4 Mon, 22 Aug 2022 15:50:34 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/october-is-cybersecurity-awareness-month.-are-you-prepared 2022-08-22T15:50:34Z See you at ALA's Chapter Leadership Institute 2022! https://www.innovativecomp.com/blog/see-you-at-alas-chapter-leadership-institute-2022 <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/see-you-at-alas-chapter-leadership-institute-2022" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/alalogo-2.jpg" alt="See you at ALA's Chapter Leadership Institute 2022!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We're looking forward to seeing Association of Legal Administrators' chapter leaders from around the continent this week in Las Vegas for the 2022 Chapter Leadership Institute!</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/see-you-at-alas-chapter-leadership-institute-2022" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/alalogo-2.jpg" alt="See you at ALA's Chapter Leadership Institute 2022!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We're looking forward to seeing Association of Legal Administrators' chapter leaders from around the continent this week in Las Vegas for the 2022 Chapter Leadership Institute!</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Fsee-you-at-alas-chapter-leadership-institute-2022&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> ALA Association of Legal Administrators Chapter Leadership Institute Wed, 13 Jul 2022 14:55:05 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/see-you-at-alas-chapter-leadership-institute-2022 2022-07-13T14:55:05Z Microsoft Office Zero-Day Exploit "Follina" https://www.innovativecomp.com/blog/microsoft-office-zero-day-exploit-follina <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/microsoft-office-zero-day-exploit-follina" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Images/alert_icon-054228-edited.jpg" alt="Microsoft Office Zero-Day Exploit &quot;Follina&quot;" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Microsoft has released workaround guidance to address a critical zero-day vulnerability — CVE-2022-30190, known as "Follina." This affects the Microsoft Support Diagnostic Tool (MSDT) in Windows. A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system. Microsoft has reported active exploitation of this vulnerability in the wild.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/microsoft-office-zero-day-exploit-follina" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Images/alert_icon-054228-edited.jpg" alt="Microsoft Office Zero-Day Exploit &quot;Follina&quot;" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Microsoft has released workaround guidance to address a critical zero-day vulnerability — CVE-2022-30190, known as "Follina." This affects the Microsoft Support Diagnostic Tool (MSDT) in Windows. A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system. Microsoft has reported active exploitation of this vulnerability in the wild.</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Fmicrosoft-office-zero-day-exploit-follina&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Alerts cybersecurity Microsoft Fri, 03 Jun 2022 20:14:39 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/microsoft-office-zero-day-exploit-follina 2022-06-03T20:14:39Z Case Study: Ransomware Attack at a Law Firm https://www.innovativecomp.com/blog/case-study-ransomware-attack-at-a-law-firm <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/case-study-ransomware-attack-at-a-law-firm" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Case%20Study%20Law%20Firm%20Ransomware%20Attack%20sidebar.jpg" alt="Case Study: Ransomware Attack at a Law Firm" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><a href="https://www.innovativecomp.com/law-firm-ransomware-attack">Read our latest case study</a> about a law firm that had its data held for ransom and how Innovative Computing Systems helped them recover without paying the criminals.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/case-study-ransomware-attack-at-a-law-firm" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Case%20Study%20Law%20Firm%20Ransomware%20Attack%20sidebar.jpg" alt="Case Study: Ransomware Attack at a Law Firm" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><a href="https://www.innovativecomp.com/law-firm-ransomware-attack">Read our latest case study</a> about a law firm that had its data held for ransom and how Innovative Computing Systems helped them recover without paying the criminals.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Fcase-study-ransomware-attack-at-a-law-firm&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> cybersecurity Ransomware Articles Tue, 24 May 2022 20:41:21 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/case-study-ransomware-attack-at-a-law-firm 2022-05-24T20:41:21Z Introducing Our Partners 8x8 https://www.innovativecomp.com/blog/introducing-our-partners-8x8 <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/introducing-our-partners-8x8" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Lowering_Costs_w_Cloud_Comms_eBook_Email_Channel_Anim_600x240.gif" alt="Introducing Our Partners 8x8" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We're happy to announce our recent partnership with <a href="https://8x8.com">8x8</a> to bring clients the best business communications solutions available.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/introducing-our-partners-8x8" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/Lowering_Costs_w_Cloud_Comms_eBook_Email_Channel_Anim_600x240.gif" alt="Introducing Our Partners 8x8" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>We're happy to announce our recent partnership with <a href="https://8x8.com">8x8</a> to bring clients the best business communications solutions available.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Fintroducing-our-partners-8x8&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Unified Communications Cloud Communications VoIP Fri, 20 May 2022 18:05:25 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/introducing-our-partners-8x8 2022-05-20T18:05:25Z iManage End-of-Life Timeline https://www.innovativecomp.com/blog/imanage-end-of-life-timeline <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/imanage-end-of-life-timeline" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/partners-2016/220x110/imanage.png" alt="iManage End-of-Life Timeline" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-size: 16px;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: black;">There are </span><span style="color: black;">a number of important iManage and related solutions requiring upgrades or patching over the coming months. We created the below infographic to help you in your legal technology planning. Please be certain to add these dates to your calendar.</span></span></p> <span style="font-family: Arial, Helvetica, sans-serif;"></span> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/imanage-end-of-life-timeline" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/partners-2016/220x110/imanage.png" alt="iManage End-of-Life Timeline" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-size: 16px;"><span style="font-family: Arial, Helvetica, sans-serif;"><span style="color: black;">There are </span><span style="color: black;">a number of important iManage and related solutions requiring upgrades or patching over the coming months. We created the below infographic to help you in your legal technology planning. Please be certain to add these dates to your calendar.</span></span></p> <span style="font-family: Arial, Helvetica, sans-serif;"></span> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Fimanage-end-of-life-timeline&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> iManage Infographic End of Support End of Life Wed, 18 May 2022 19:17:49 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/imanage-end-of-life-timeline 2022-05-18T19:17:49Z Top 15 Most Exploited Vulnerabilities of 2021 https://www.innovativecomp.com/blog/top-15-most-exploited-vulnerabilities-of-2021 <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/top-15-most-exploited-vulnerabilities-of-2021" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/Cyber_crime.jpg" alt="Top 15 Most Exploited Vulnerabilities of 2021" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>United States, Australia, Canada, New Zealand and United Kingdom cybersecurity authorities, including the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC) and United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory yesterday detailing the most exploited technology vulnerabilities from 2021. The advisory provides details on the top 15 Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.<br><br>U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities report that malicious cyber actors aggressively targeted newly disclosed critical software vulnerabilities against broad target sets, including public and private sector organizations worldwide in 2021. To a lesser extent, malicious cyber actors continued to exploit publicly known, dated software vulnerabilities across a broad spectrum of targets.<br><br>Important to note is that three of the top 15 routinely exploited vulnerabilities were also routinely exploited in 2020. As the agencies note, their continued exploitation indicates that many organizations fail to patch software in a timely manner and remain vulnerable to malicious cyber actors.<br><br></p> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/top-15-most-exploited-vulnerabilities-of-2021" title="" class="hs-featured-image-link"> <img src="https://www.innovativecomp.com/hubfs/social-suggested-images/Cyber_crime.jpg" alt="Top 15 Most Exploited Vulnerabilities of 2021" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>United States, Australia, Canada, New Zealand and United Kingdom cybersecurity authorities, including the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC) and United Kingdom’s National Cyber Security Centre (NCSC-UK) issued a joint Cybersecurity Advisory yesterday detailing the most exploited technology vulnerabilities from 2021. The advisory provides details on the top 15 Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.<br><br>U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities report that malicious cyber actors aggressively targeted newly disclosed critical software vulnerabilities against broad target sets, including public and private sector organizations worldwide in 2021. To a lesser extent, malicious cyber actors continued to exploit publicly known, dated software vulnerabilities across a broad spectrum of targets.<br><br>Important to note is that three of the top 15 routinely exploited vulnerabilities were also routinely exploited in 2020. As the agencies note, their continued exploitation indicates that many organizations fail to patch software in a timely manner and remain vulnerable to malicious cyber actors.<br><br></p> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Ftop-15-most-exploited-vulnerabilities-of-2021&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> cybersecurity Cybercrime Patching Thu, 28 Apr 2022 18:22:55 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/top-15-most-exploited-vulnerabilities-of-2021 2022-04-28T18:22:55Z Innovative Legal Technology News — Spring 2022 https://www.innovativecomp.com/blog/innovative-legal-technology-news-spring-2022 <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/innovative-legal-technology-news-spring-2022" title="" class="hs-featured-image-link"> <img src="https://361629.fs1.hubspotusercontent-na1.net/hub/361629/hubfs/just-circle.png?upscale=true&amp;width=438&amp;upscale=true&amp;name=just-circle.png" alt="Innovative Legal Technology News&nbsp;— Spring 2022" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div> <div> <table width="100%" style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;"> <tbody> <tr> <td style="padding: 0px;"> <h1>Innovative Legal Technology News</h1> <p>Just as legal professionals were becoming acclimated to the latest public health and economic upheavals, geopolitical tensions emerged to undermine any sense of stability. Proving once again our interdependence and vulnerability to seemingly far-off challenges, the U.S. government has issued repeated warnings over the past months that cybersecurity attacks against Western businesses and organizations could be part of any attack by Russia on Ukraine. Despite little evidence of any widespread success with such attacks against U.S.-based businesses so far, such warnings only further reiterate to legal professionals the necessity of carefully managing their cybersecurity. Read the rest<span>&nbsp;</span><a href="https://www.legalmanagement.org/lm-extras/the-effect-of-a-war-overseas-on-cybersecurity-at-home?utm_campaign=Newsletters&amp;utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-8IcBlpQIQO5yO2mUEWevOR-bWWGfq68skGOO_Cfwv3SQJZyMPXIfWw33-m6J93h91nKopy"><strong>of our advice for legal professionals as they confront continued uncertainty in the Association of Legal Administrators'<span>&nbsp;</span><em>Legal Management Extra</em></strong></a>.</p> </td> </tr> </tbody> </table> </div> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://www.innovativecomp.com/blog/innovative-legal-technology-news-spring-2022" title="" class="hs-featured-image-link"> <img src="https://361629.fs1.hubspotusercontent-na1.net/hub/361629/hubfs/just-circle.png?upscale=true&amp;width=438&amp;upscale=true&amp;name=just-circle.png" alt="Innovative Legal Technology News&nbsp;— Spring 2022" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div> <div> <div> <table width="100%" style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2;"> <tbody> <tr> <td style="padding: 0px;"> <h1>Innovative Legal Technology News</h1> <p>Just as legal professionals were becoming acclimated to the latest public health and economic upheavals, geopolitical tensions emerged to undermine any sense of stability. Proving once again our interdependence and vulnerability to seemingly far-off challenges, the U.S. government has issued repeated warnings over the past months that cybersecurity attacks against Western businesses and organizations could be part of any attack by Russia on Ukraine. Despite little evidence of any widespread success with such attacks against U.S.-based businesses so far, such warnings only further reiterate to legal professionals the necessity of carefully managing their cybersecurity. Read the rest<span>&nbsp;</span><a href="https://www.legalmanagement.org/lm-extras/the-effect-of-a-war-overseas-on-cybersecurity-at-home?utm_campaign=Newsletters&amp;utm_source=hs_email&amp;utm_medium=email&amp;_hsenc=p2ANqtz-8IcBlpQIQO5yO2mUEWevOR-bWWGfq68skGOO_Cfwv3SQJZyMPXIfWw33-m6J93h91nKopy"><strong>of our advice for legal professionals as they confront continued uncertainty in the Association of Legal Administrators'<span>&nbsp;</span><em>Legal Management Extra</em></strong></a>.</p> </td> </tr> </tbody> </table> </div> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=361629&amp;k=14&amp;r=https%3A%2F%2Fwww.innovativecomp.com%2Fblog%2Finnovative-legal-technology-news-spring-2022&amp;bu=https%253A%252F%252Fwww.innovativecomp.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> iManage cybersecurity Newsletter Fri, 08 Apr 2022 15:00:47 GMT wpate@innovativecomp.com (William Pate) https://www.innovativecomp.com/blog/innovative-legal-technology-news-spring-2022 2022-04-08T15:00:47Z