• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

World Economic Forum: Cybersecurity Problem No. 1 in COVID-19 Era

Posted by William Pate

January 21, 2021 9:41 AM

  • Tweet

The World Economic Forum (WEF) just published their recent survey of worldwide corporate leaders. When asked about technology objectives that have become a greater priority due to COVID-19, they elevated information security to the No. 1 position, with business continuity and resilience following right after. These days, that's practically all in the IT domain. 

 

Here is a list of the five main cybersecurity challenges that global leaders identified should be tackled (better) in 2021. Cybersecurity is a board-level issue now for many firms:

Read More

Topics: cybersecurity, Business Continuity, COVID-19

Where Law Firm IT Budgets Should Focus in 2021

Posted by William Pate

November 18, 2020 4:59 PM

  • Tweet

Don't miss Innovative founder and CEO Michael Kemps' latest essay with advice on legal technology budget planning for 2021 in Legaltech News:

Read More

Topics: Technology Consulting, Cloud, Articles, Business Continuity

How to Prioritize Your Legal Technology Investments

Posted by William Pate

August 13, 2020 11:39 AM

  • Tweet

Prioritize Your Legal Technology Investments

Read More

Topics: Articles, Innovative Cloud Solution, Business Continuity

Law Firm Business Continuity & COVID-19: Results from Our Survey

Posted by William Pate

June 16, 2020 12:22 PM

  • Tweet

 

As it has for large swaths of the economy, the novel coronavirus pandemic offered many U.S.-based law firms their first opportunity to truly put their business continuity plans to the test. Whether firm leadership relied on established, written-down plans or winged it with ad hoc fixes as problems arose, the sudden issuance of various varieties of stay-at-home/shelter-in-place orders (and the still-ongoing reopenings) has driven home the need for planning to continue operations under a variety of less-than-ideal or expected conditions.

Read More

Topics: Disaster Recovery, Survey, Business Continuity, COVID-19

Law Firm COVID-19 Business Continuity Preparedness Survey

Posted by William Pate

April 27, 2020 3:33 PM

  • Tweet

We invite individuals employed by U.S.-based law firms to reflect on your firm's response to the COVID-19 pandemic by completing our survey. Your responses, in addition to the results of your colleagues' feedback, will help you evaluate your firm's ability to deliver client services during crisis conditions.

Read More

Topics: Survey, Business Continuity, COVID-19

Top 5 Blog Posts of 2019: #2 Our 30th Anniversary

Posted by William Pate

December 16, 2019 2:24 PM

  • Tweet

In our second most popular blog post this year, we celebrated our 30th anniversary by reflecting on the changes we've seen in the legal technology industry since Innovative Computing Systems opened for business. 

Read More

Topics: Technology Consulting, Business Continuity, Anniversary

Top 5 Blog Posts of 2019: #3 Security Summit Webcast

Posted by William Pate

December 12, 2019 4:24 PM

  • Tweet

In mid-2019, we held our first online security summit bringing together legal, cybersecurity and IT professionals to discuss law firms' responsibility to manage cybersecurity, including risk management, potential future threats and steps firms should take to ensure the security of their firms' and clients' data. Our third most popular blog post from 2019 was the invitation to the summit. 

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, phishing, Business Continuity

Top 5 Blog Posts of 2019: #4 Personal Phishing Attack

Posted by William Pate

December 10, 2019 5:44 PM

  • Tweet

Our fourth most popular blog of 2019 falls outside the strict theme of "business continuity" as it was a recount of a personal phishing attack I experienced (and have experienced again since). Nonetheless, it is just these personal attacks that lead to cybersecurity breaches of larger organizations. In fact, cybercriminals are often able to reuse the credentials they discover in successful cyberattacks against individuals' personal data to access corporate and other accounts. 

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, phishing, Business Continuity

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (127)
  • IT Tips (89)
  • Technology Consulting (74)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Training (32)
  • Cloud (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.