• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

31 Days of Law Firm Data Security: Day 19 | Use 2FA

Posted by William Pate

January 19, 2020 2:45 AM

  • Tweet

Use 2FA.

Read More

Topics: cybersecurity, Passwords, Two Factor Authentication, 2FA, 31 Days of Law Firm Data Security

Gaps in your Defense: Two-Factor Authentication Bypass Users

Posted by William Pate

August 7, 2019 11:54 AM

  • Tweet

Two-factor authentication is like a fence. It works really well when it’s used correctly.

Read More

Topics: Alerts, cybersecurity, Two Factor Authentication, 2FA

Enhanced Cybersecurity: Why You Need an MSP

Posted by William Pate

August 28, 2018 11:11 AM

  • Tweet
The only thing to be afraid of when it comes to cybersecurity is not having a plan.

 

Read More

Topics: Security, Technology Consulting, Managed Services, cybersecurity, Two Factor Authentication, 2FA, Information Security

Is Your Firm Secure?

Posted by William Pate

March 13, 2018 3:14 PM

  • Tweet

Hackers' methods continue to evolve. That means your security must evolve. 

To adequately protect your firm, you need:

Read More

Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall

Has your password been stolen?

Posted by William Pate

August 8, 2017 9:26 AM

  • Tweet

Has your password been stolen? Are you worried one of your firms' email addresses has been compromised? 

 

There's an easy way to find out. 

Read More

Topics: Email Management, Passwords, Two Factor Authentication, Email Security, 2FA

Fortinet 2017 SMB Preferences Infographic

Posted by William Pate

May 22, 2017 2:22 PM

  • Tweet
Read More

Topics: Email Management, cybersecurity, Passwords, Two Factor Authentication, Email Security, 2FA, Information Security, firewall

Two-Factor Authentication: A Password Evolution

Posted by Mike Paul

May 18, 2017 1:37 PM

  • Tweet

Read our CTO Mike Paul's article in Legal Ink Magazine! 

 

Read More

Topics: cybersecurity, Passwords, Two Factor Authentication, 2FA

The Path to Two-Factor Authentication

Posted by Mike Paul

May 8, 2017 9:17 AM

  • Tweet

Our CTO, Mike Paul, offers our path to two-factor authentication, and why you should follow your own path to enhanced security with 2FA.

 

Over the next few weeks, Mike will tell our story and offer advice on moving to 2FA.

 

 

Innovative Computing Systems is a managed service provider with over 300 clients. Frequently, we become our client’s trusted resource for all things IT. One of the challenges that we have, as most organizations do, relates to password management.

 

Read More

Topics: cybersecurity, Passwords, Two Factor Authentication, 2FA

Why Workstation Imaging is More Important Than You Think

Posted by Logan Byrd

March 6, 2017 4:19 PM

  • Tweet

Many law firms and businesses put off creating and using a standardized workstation image. Instead, they use whatever operating system comes pre-configured on the computers they purchase. Sometimes they will install a clean operating system and configure each machine from scratch for each newly purchased computer. This is a mistake which can be both expensive and dangerous. Thankfully, your computer environment can be made more secure, and your IT costs can be reduced, by implementing a standard workstation image.

Read More

Topics: Technology Consulting, Data Backups, IT Tips, Disaster Recovery, 2FA, Imaging

New Year, New Attitude About Security

Posted by William Pate

February 3, 2017 10:05 AM

  • Tweet

How are your New Year's resolutions going?

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, Passwords, Two Factor Authentication, 2FA, Duo

Common Two-Factor Authentication (2FA) Solutions

Posted by William Pate

December 13, 2016 7:16 AM

  • Tweet

 

At Innovative Computing Systems, we promote a cybersecurity perspective called “defense-in-depth.” Essentially, we believe law firms, legal departments and individuals need more than one or two layers of information security. Users and clients must be confident that even if one defense fails, another will stand up and attempt to prevent or mitigate an attack. We have long recommended that clients utilize two-factor authentication as one of those layers of defense.

Read More

Topics: Dual Factor Authentication, cybersecurity, Two Factor Authentication, 2FA, Duo, Information Security

You've Been Hacked: Now What?

Posted by William Pate

November 23, 2016 10:03 AM

  • Tweet

Our partners at SentinelOne recently reported that 50 percent of organizations have been victim to cyberattacks. Eighty-five percent of those said they had been attacked three or more times.

Read More

Topics: Training, Information Governance, cybersecurity, Two Factor Authentication, Hacking, FBI Internet Crime Complaint Center, Secret Service, Cybercrime, Email Security, 2FA

Another New Article: The Rise of Ransomware

Posted by William Pate

October 20, 2016 12:20 PM

  • Tweet

Yesterday, shortly after our CEO Michael Kemps' article was published by the American Bar Association, the Association of Legal Administrators (ALA) released the newest issue of their magazine Legal Management. Michael has an article in it, too!

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, Two Factor Authentication, Ransomware, Endpoint Protection, ALA, Cybercrime, ALA 2016, Publications, 2FA

Yahoo! Hacked — Change Your Password Now

Posted by William Pate

September 22, 2016 5:12 PM

  • Tweet

We wanted to inform you of a serious security breach at Yahoo!

 

Earlier today, Yahoo! issued a press release stating that 500 million users' accounts were breached in a 2014 hack of their systems. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information. 

 

Yahoo! said in the press release that: 

 

A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network.


If you were a victim of the attack, we encourage you to review these steps you can take to file a report and help protect yourself from identity theft. 

 

Yahoo! also recommends – as we do, too – that users take advantage of two-factor authentication to provide an extra layer of security to their Yahoo! accounts. 


Yahoo! is not what we would consider a best-of-breed solution for email or other business matters. If you would like to discuss more enterprise-level, law firm standard solutions, please email sales@innovativecomp.com or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in-depth.

Read More

Topics: Security, Dual Factor Authentication, cybersecurity, Passwords, Two Factor Authentication, Hacking, Email Security, Yahoo, 2FA

Yahoo! Hacked — Reset Your Password Now!

Posted by William Pate

September 1, 2016 3:47 PM

  • Tweet

We wanted to inform you of a serious security breach at Yahoo!

 

Earlier today, Yahoo! issued a press release stating that 500 million users' accounts were breached. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information. 

 

Yahoo! said in the press release that: 

 

A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network.


If you were a victim of the attack, we encourage you to review these steps you can take to file a report and help protect yourself from identity theft. 

 

Yahoo! also recommends – as we do, too – that users take advantage of two-factor authentication to provide an extra layer of security to their Yahoo! accounts. 


Yahoo! is not what we would consider a best-of-breed solution for email or other business matters. If you would like to discuss more enterprise-level, law firm standard solutions, please email sales@innovativecomp.com or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in-depth.

Read More

Topics: Security, Alerts, Dual Factor Authentication, cybersecurity, Passwords, Two Factor Authentication, Hacking, Email Security, Yahoo, 2FA

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (126)
  • IT Tips (89)
  • Technology Consulting (73)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Cloud (31)
  • Training (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Business Continuity (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • COVID-19 (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.