• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

U.S. Courts Modify Filing Procedures After SolarWinds Hack

Posted by William Pate

January 13, 2021 8:41 AM

  • Tweet

The ongoing breach affecting thousands of organizations that relied on hacked products by network software firm SolarWinds may have jeopardized the privacy of countless sealed court documents on file with the U.S. federal court system, according to a memo from the Administrative Office (AO) of the U.S. Courts.

Read More

Topics: cybersecurity, Hacking, Information Security

National Tax Security Awareness Week opens with warnings as holidays, 2021 tax season approach

Posted by William Pate

November 30, 2020 10:33 AM

  • Tweet

The Internal Revenue Service and its Security Summit partners today issued warnings to all taxpayers and tax professionals to beware of scams and identity theft schemes by criminals taking advantage of the combination of holiday shopping, the approaching tax season and coronavirus concerns.

Read More

Topics: Security, cybersecurity

Treasury Department Warning on Ransomware Attacks & Payments

Posted by William Pate

October 12, 2020 2:01 PM

  • Tweet

 

Read More

Topics: Security, cybersecurity, Ransomware, Information Security, Privacy

Top Ways to Ensure a Secure Zoom Meeting

Posted by William Pate

April 2, 2020 11:07 AM

  • Tweet

As thousands of people begin using Zoom for videoconferencing from home for the first time under the coronavirus threat, we thought some guidance on ensuring your meetings are secure might come in handy.

Read More

Topics: videoconferencing, cybersecurity, COVID-19, Remote Access, zoom

Hackers Take Advantage of COVID-19

Posted by William Pate

March 20, 2020 9:38 AM

  • Tweet

Hackers are taking advantage of the confusion surrounding the novel coronavirus pandemic. 

Read More

Topics: Alerts, Webinars, cybersecurity, Cybersecurity Infographic, COVID-19

Moving Law Firms to the Cloud for Remote Access & Security

Posted by William Pate

March 18, 2020 10:28 AM

  • Tweet

We've been encouraging law firms and legal professionals to take advantage of the benefits offered by moving to the cloud for a few years now. We're such big believers that we invested significant research and development in designing a legal-focused cloud solution, the Innovative Cloud Solution, that gives employees of firms of all sizes the power to access and work safely from anywhere. Recent events have highlighted how businesses operating in the cloud have a competitive advantage over those still tied to an office.

Read More

Topics: Cloud, ILTA, cybersecurity, Cloud Infographic, Articles, Innovative Cloud Solution, Remote Access

Top Clicked Phishing Tests (4Q2019) [Infographic]

Posted by William Pate

March 10, 2020 9:09 AM

  • Tweet

Check out what hackers are using to trick employees into clicking fake links in emails in our partner KnowBe4's review of the Top Clicked Phishing Tests from the last quarter of 2019 in the below infographic. 

Read More

Topics: cybersecurity, Infographic, phishing, KnowBe4

Biggest Cybersecurity Risks for the Legal Sector

Posted by Summer Westfield

March 3, 2020 2:40 PM

  • Tweet

The term "attorney-client privilege," often heard in crime procedurals on TV, speaks of the level of confidentiality that exists in the legal sector. Due to the nature of their work protecting organizations and individuals, law firms receive and handle some of the most sensitive information in the world. Unfortunately, this makes them a prime target for hackers who want to infiltrate their networks and steal that information. The goal of these cybercriminals is usually to sell that data to interested parties or to restrict access to their targets’ own networks, which for law firms can be crippling.

Since 2014, an investigation revealed that over 100 law firms have notified authorities of data breaches, and this number only encompasses 14 states. Major law firms, mid-size firms, solo practitioners, and even law schools were affected by these attacks, which goes to show that no one is safe from cyber crime. Given its scope, a good place to start mitigating the issue is by identifying the biggest risks. Here are the leading cybersecurity threats that law professionals should know:

Read More

Topics: cybersecurity

Spring 2020 Cybersecurity Update Webcast Resources

Posted by William Pate

February 25, 2020 3:19 PM

  • Tweet

If you missed our Spring 2020 Cybersecurity Update today, you can watch the recording here. 

Read More

Topics: cybersecurity

31 Days of Law Firm Data Security: Day 31 | Use a Password Manager/Vault

Posted by William Pate

January 31, 2020 12:15 AM

  • Tweet

Use a password manager.

Read More

Topics: cybersecurity, Passwords, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 30 | Auto-Lock

Posted by William Pate

January 30, 2020 12:30 AM

  • Tweet

Set your devices to auto-lock.

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 29 | Delete Unused Apps

Posted by William Pate

January 29, 2020 12:00 AM

  • Tweet

Delete old programs and apps.

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 28 | Outlook Web Access

Posted by William Pate

January 28, 2020 12:45 AM

  • Tweet

Lock down Outlook Web Access.

Read More

Topics: Email Management, Access Control, cybersecurity, Email Security, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 27 | Pick a Browser

Posted by William Pate

January 27, 2020 12:15 AM

  • Tweet

Pick a Web browser — and stick with it. 

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 26 | Sensitive Surfing

Posted by William Pate

January 26, 2020 12:00 AM

  • Tweet

Sensitive surfing.

Read More

Topics: cybersecurity, 31 Days of Law Firm Data Security

All posts Next

Comment on this post

Recent Posts

Categories

  • cybersecurity (126)
  • IT Tips (89)
  • Technology Consulting (73)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Cloud (31)
  • Training (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Business Continuity (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • COVID-19 (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.