• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Where Law Firm IT Budgets Should Focus in 2021

Posted by William Pate

November 18, 2020 4:59 PM

  • Tweet

Don't miss Innovative founder and CEO Michael Kemps' latest essay with advice on legal technology budget planning for 2021 in Legaltech News:

Read More

Topics: Technology Consulting, Cloud, Articles, Business Continuity

How to Prioritize Your Legal Technology Investments

Posted by William Pate

August 13, 2020 11:39 AM

  • Tweet

Prioritize Your Legal Technology Investments

Read More

Topics: Articles, Innovative Cloud Solution, Business Continuity

Moving Law Firms to the Cloud for Remote Access & Security

Posted by William Pate

March 18, 2020 10:28 AM

  • Tweet

We've been encouraging law firms and legal professionals to take advantage of the benefits offered by moving to the cloud for a few years now. We're such big believers that we invested significant research and development in designing a legal-focused cloud solution, the Innovative Cloud Solution, that gives employees of firms of all sizes the power to access and work safely from anywhere. Recent events have highlighted how businesses operating in the cloud have a competitive advantage over those still tied to an office.

Read More

Topics: Cloud, ILTA, cybersecurity, Cloud Infographic, Articles, Innovative Cloud Solution, Remote Access

Effectively Managing Increasing Client Security Requirements

Posted by William Pate

December 6, 2019 12:44 PM

  • Tweet
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the personally identifiable information to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.

 

Read More

Topics: cybersecurity, Articles, Client Audits, Privacy

The Top 6 Penetration Testing Fails

Posted by William Pate

July 8, 2019 5:10 PM

  • Tweet

It happens so innocently: an employee logs into email, sees a message that his password needs to be updated in Outlook and clicks on the link provided. But the email wasn’t generated by Microsoft, it was sent from a cybercriminal who had an email address that looked legitimate. Suddenly, an attack has been launched on your employee and your firm.

The time is now to better understand your firm’s weaknesses. What systems are vulnerable? How can you best secure the environment? How can you best secure data stored in the cloud? How can you best secure on-premises infrastructure? How do you secure your firm’s general computing environment?

Our article “The Top 6 Penetration Testing Fails” will help you answer these extremely tough questions.

Top 6 Pen-Testing Fails

We'd love to share advice on enhancing your firm's cybersecurity. Call us at 1-800-541-0450 or email us at sales@innovativecomp.com to get started. 

 

Read More

Topics: cybersecurity, Cybercrime, Articles, Information Security, Penetration Testing

8 Steps to Take After a Cyberattack

Posted by William Pate

July 3, 2019 11:52 AM

  • Tweet

Everyone needs to know what to do in the event of a successful cyberattack.

Read More

Topics: Security, Training, Technology Consulting, cybersecurity, Ransomware, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, Cybercrime, Publications, Articles, Information Security

2018 is the year for law firms to seriously consider Office 365

Posted by Mike Paul

January 26, 2018 10:03 AM

  • Tweet

Early in my law firm IT career, one of the more complicated applications I had to support was Microsoft Exchange, the flagship enterprise application from Microsoft that drives millions of email messages each day. When Exchange hums, business communication flows. But when the application is having problems, law firm communications come to a screeching halt.

 

Read More

Topics: Partners, Microsoft, Office 365, Articles

What steps should a legal professional take to tackle an info management challenge?

Posted by William Pate

November 27, 2017 9:37 AM

  • Tweet

"What steps should a legal professional take to tackle an info management challenge?"

Read More

Topics: IT Tips, ILTA, Articles

Five Ways to Prioritize Your Legal Tech Investments (and Get the Most Bang for Your Buck)

Posted by William Pate

November 17, 2017 9:11 AM

  • Tweet

 

Read More

Topics: Articles

Update on Cyberattacks Against Law Firms

Posted by William Pate

December 9, 2016 1:29 PM

  • Tweet

News this week that a series of cyberattacks and data breaches at North American law firms in 2015 was worse than initially reported (isn't that always the case?) was seemingly timed with the release of a bevy of new articles and information sheets on cybersecurity by our staff.

Read More

Topics: Security, Technology Consulting, Cloud, IT Tips, cybersecurity, Cybercrime, Email Security, Articles, Information Security

The Human Factor in Information Security

Posted by William Pate

December 2, 2016 10:48 AM

  • Tweet

No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others. Legal, accounting and other professional firms are increasingly targeted by cybercriminals and hackers who are intent on accessing the vast stores of data with which they are entrusted.

Read More

Topics: Technology Consulting, cybersecurity, Cybercrime, Articles

Improve Your Law Firm's Security in One Week

Posted by Charles Koo

November 29, 2016 10:12 AM

  • Tweet

Improving your law firm's information security infrastructure, protocols and policies doesn't have to be as time-consuming as you may think. Indeed, making small daily changes and updates to ensure your data is secure is just as important as the first day you turn on your new cybersecurity solution. Doing this allows you to stay on top of changes in the security environment, software and hardware updates and other functions that often fall between the cracks.

 

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, Cybercrime, Articles, Information Security

Security in the Cloud

Posted by William Pate

September 13, 2016 2:18 PM

  • Tweet

Moving to the cloud is an important decision. Let our CEO Michael Kemps walk you through important security aspects of the cloud in his new article.

Read More

Topics: Security, Cloud, Cloud Storage, cybersecurity, Cybercrime, Articles

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (130)
  • IT Tips (89)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.