Read our latest case study about a law firm that had its data held for ransom and how Innovative Computing Systems helped them recover without paying the criminals.
Read our latest case study about a law firm that had its data held for ransom and how Innovative Computing Systems helped them recover without paying the criminals.
Topics: cybersecurity, Ransomware, Articles
Innovative Legal Technology NewsData security at law firms continued to be a challenge in 2021, with professionals working from home, trickling back into the office, then being sent home again to wrap up the year. New threats to data security emerged, along with new best practices for protecting law firm and client data. This past year’s developments can be used as a forecast for upcoming law firm data security. Read the rest of Innovative Computing Systems' CEO Michael Kemps' advice for law firms as they prepare for 2021 in Legaltech News. |
Anatomy of a CyberattackRead CTO Michael Paul's recent dissection of a phishing and ransomware attack in Cybersecurity Law & Strategy. |
Holiday HoursPlease note the following holiday hours we will be observing in December 2021:
Innovative Computing Systems, Inc. will be closed:
🎇 Friday, December 31, 2021
However, our on-call support will still be available.
Should you need support on the above days, please use our 24-hour phone number: 1-800-541-0450.
Our support@innovativecomp.com mailbox is not monitored after hours or on holidays. |
Thank you, Cheri! Welcome, Mary!After over a decade with Innovative, Cheri Walker is leaving to enjoy retirement. We thank her for her work and will miss her.
We welcome Mary Wands to the Innovative team as Logistics Specialist. Based in Phoenix, Mary has considerable business solutions experience, including project coordination for a managed services provider. Those of you familiar with Cheri will soon enjoy working with Mary. Welcome aboard, Mary! |
Innovative InsightsFrom our blog: |
iManage: More Than Just Document ManagementDon't miss our latest series of blog posts by engineers Sharee Schuchardt and Elizabeth DeLuna on the many overlooked features of iManage. Read now |
⚠️ Cybersecurity TipKeep current with the latest cybersecurity news and our most recent technical alerts to clients on our Technical Alerts page. |
Innovative Resources |
Topics: cybersecurity, Articles, Newsletter
We've been asked to share our expertise and predictions by a number of different media outlets in the past month. Here are a few highlights:
Topics: Technology Consulting, cybersecurity, Articles
Posted by William Pate
June 18, 2021 5:49 PM
Topics: Technology Consulting, Managed Services, Articles
Don't miss Innovative founder and CEO Michael Kemps' latest essay with advice on legal technology budget planning for 2021 in Legaltech News:
Topics: Technology Consulting, Cloud, Articles, Business Continuity
Posted by William Pate
March 18, 2020 10:28 AM
We've been encouraging law firms and legal professionals to take advantage of the benefits offered by moving to the cloud for a few years now. We're such big believers that we invested significant research and development in designing a legal-focused cloud solution, the Innovative Cloud Solution, that gives employees of firms of all sizes the power to access and work safely from anywhere. Recent events have highlighted how businesses operating in the cloud have a competitive advantage over those still tied to an office.
Topics: Cloud, ILTA, cybersecurity, Cloud Infographic, Articles, Innovative Cloud Solution, Remote Access
Posted by William Pate
December 6, 2019 12:44 PM
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the personally identifiable information to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.
Topics: cybersecurity, Articles, Client Audits, Privacy
It happens so innocently: an employee logs into email, sees a message that his password needs to be updated in Outlook and clicks on the link provided. But the email wasn’t generated by Microsoft, it was sent from a cybercriminal who had an email address that looked legitimate. Suddenly, an attack has been launched on your employee and your firm.
The time is now to better understand your firm’s weaknesses. What systems are vulnerable? How can you best secure the environment? How can you best secure data stored in the cloud? How can you best secure on-premises infrastructure? How do you secure your firm’s general computing environment?
Our article “The Top 6 Penetration Testing Fails” will help you answer these extremely tough questions.
We'd love to share advice on enhancing your firm's cybersecurity. Call us at 1-800-541-0450 or email us at sales@innovativecomp.com to get started.
Topics: cybersecurity, Cybercrime, Articles, Information Security, Penetration Testing
Topics: Security, Training, Technology Consulting, cybersecurity, Ransomware, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, Cybercrime, Publications, Articles, Information Security
Posted by Mike Paul
January 26, 2018 10:03 AM
Early in my law firm IT career, one of the more complicated applications I had to support was Microsoft Exchange, the flagship enterprise application from Microsoft that drives millions of email messages each day. When Exchange hums, business communication flows. But when the application is having problems, law firm communications come to a screeching halt.
Topics: Partners, Microsoft, Office 365, Articles
Posted by William Pate
November 27, 2017 9:37 AM
Posted by William Pate
November 17, 2017 9:11 AM
Topics: Articles
News this week that a series of cyberattacks and data breaches at North American law firms in 2015 was worse than initially reported (isn't that always the case?) was seemingly timed with the release of a bevy of new articles and information sheets on cybersecurity by our staff.
Topics: Security, Technology Consulting, Cloud, IT Tips, cybersecurity, Cybercrime, Email Security, Articles, Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others. Legal, accounting and other professional firms are increasingly targeted by cybercriminals and hackers who are intent on accessing the vast stores of data with which they are entrusted.
Topics: Technology Consulting, cybersecurity, Cybercrime, Articles
Comment on this post