• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Law Firm Business Continuity & COVID-19: Results from Our Survey

Posted by William Pate

June 16, 2020 12:22 PM

  • Tweet

 

As it has for large swaths of the economy, the novel coronavirus pandemic offered many U.S.-based law firms their first opportunity to truly put their business continuity plans to the test. Whether firm leadership relied on established, written-down plans or winged it with ad hoc fixes as problems arose, the sudden issuance of various varieties of stay-at-home/shelter-in-place orders (and the still-ongoing reopenings) has driven home the need for planning to continue operations under a variety of less-than-ideal or expected conditions.

Read More

Topics: Disaster Recovery, Survey, Business Continuity, COVID-19

☣ Plan for Coronavirus Impacts

Posted by William Pate

February 19, 2020 4:45 PM

  • Tweet

In an effort to keep you abreast of ongoing developments that could impact your firm's technology, we wanted to alert you to increasing likelihood of disruptions to major IT manufacturers' supply chains due to the Coronavirus outbreak in Asia.

Read More

Topics: Security, Technology Consulting, IT Tips, Alerts, Disaster Recovery

Cloud Disaster Recovery -- A Panel Discussion

Posted by William Pate

August 3, 2017 11:01 AM

  • Tweet

Are you attending the International Legal Technology Association Conference and Expo this year?

 

If so, be sure to stop by our panel discussion on Cloud Disaster Recovery. Join our CEO Michael Kemps, CTO Mike Paul and Senior Systems Engineer Sonny Sheth as they review the key facets of cloud disaster recovery and best practices on implementation.

 

Read More

Topics: Cloud, Data Backups, Cloud Storage, Disaster Recovery

Why Workstation Imaging is More Important Than You Think

Posted by Logan Byrd

March 6, 2017 4:19 PM

  • Tweet

Many law firms and businesses put off creating and using a standardized workstation image. Instead, they use whatever operating system comes pre-configured on the computers they purchase. Sometimes they will install a clean operating system and configure each machine from scratch for each newly purchased computer. This is a mistake which can be both expensive and dangerous. Thankfully, your computer environment can be made more secure, and your IT costs can be reduced, by implementing a standard workstation image.

Read More

Topics: Technology Consulting, Data Backups, IT Tips, Disaster Recovery, 2FA, Imaging

Is Hybrid Cloud Storage the Answer for Your Storage?

Posted by William Pate

January 27, 2017 10:35 AM

  • Tweet

Is hybrid storage right for your law firm or business? Are you familiar with it?

Read More

Topics: Data Backups, Cloud Storage, Disaster Recovery, Hybrid Storage, On-Premises Storage

What is the Cloud and How Are Attorneys Really Using It?

Posted by Charles Koo

December 5, 2016 3:27 PM

  • Tweet

According to the American Bar Association 2016 Legal Technology Survey Report, only 38 percent of lawyers are using cloud computing for tasks relating to their practice. Overall, 53 percent report that they do not use cloud computing at all while about 10 percent say they don’t know if they do or not.

 

In reality, these attorneys may not be aware that they’re probably already using the cloud but just don’t know it.

 

So what is the cloud, and why should you care?

Read More

Topics: Technology Consulting, Cloud, Data Backups, IT Tips, Cloud Storage, Disaster Recovery

[INFOGRAPHIC] Where is the Best Place to Store Your Data?

Posted by William Pate

August 23, 2016 1:20 PM

  • Tweet

When you consider the best place(s) to store your data – in the cloud, on-premises in your office or some hybrid of the two – what questions do you ask?

Read More

Topics: Cloud, Data Backups, Cloud Storage, Disaster Recovery, Network, Access Control, cybersecurity, Cybercrime

Putting Your Money Where Your Data Is

Posted by William Pate

June 30, 2016 1:27 PM

  • Tweet

Where should your law firm's data be stored?

 

Read More

Topics: Technology Consulting, Cloud, Data Backups, IT Tips, Cloud Storage, Disaster Recovery, Webinars, cybersecurity, Cybercrime

Law Firm Data: Safer in the Cloud

Posted by William Pate

April 12, 2016 10:31 AM

  • Tweet

When faced with hurricanes, earthquakes, geomagnetic storms and floods, law firms' data is safer in the cloud than anywhere else. Traditional data centers are built strong to protect against natural disasters, but when it comes time for your data to evacuate, it needs to have somewhere to go. The cloud offers that protection with multiple levels of redundancy across the world, so your data will survive even if one location is hit or damaged. Here are four scenarios the cloud protects your law firm from:

Read More

Topics: Cloud, Data Backups, Data Recovery, Cloud Storage, Disaster Recovery, cybersecurity, Partners, Microsoft

Don't Let Your Law Firm Become Whale Bait

Posted by Tim Sheehan

February 22, 2016 3:55 PM

  • Tweet

UPDATE 1 MAR 2016: Our partners at Mimecast announced today at the RSA Conference that they are launching the first-ever threat protection against whaling. Learn more here.

 

Whaling Attack? No, it’s not the latest survivalist reality television show. It’s a potential hacking threat posing a real problem for today’s technologically driven law firms and companies. [Update 29 FEB 2016: Here are a few good, if sad, examples of whaling.]

As in reality, whales are bigger than phish. Phishing is usually conducted using shotgun-style emails sent to the masses looking for people to divulge sensitive information, like Social Security Numbers or other personally identifiable information (PII). A whaling attack, however, targets the C-suite, partners, upper management, celebrities and other individuals of high worth or influence.

Read More

Topics: Security, Malware, Technology Consulting, IT Tips, Disaster Recovery, Email Management, Network, SentinelOne, whaling, cybersecurity, phishing

Hardening Your Computer – Decrease Your Vulnerability Footprint

Posted by Kyle Worley

February 16, 2016 5:05 PM

  • Tweet

When it comes to information security there is no silver bullet to stop attackers from infiltrating your firm. The “defense-in-depth” approach to information security is simple: add many layers of protection between yourself and the outside world. Hardening your computer is exactly what it sounds like, adding security measures to increase the difficulty of an attacker compromising your system. Below you will find a checklist of system hardening best practices, each of these are easy to implement and are critical in protecting your computer.

Read More

Topics: Security, Malware, Technology Consulting, Data Recovery, IT Tips, Disaster Recovery, Information Governance, Email Management, Access Control, SentinelOne

Evaluating and Selecting the 4 Most Important Facets of Network Technologies for Your Law Firm

Posted by Eric Hoffmaster

January 19, 2016 8:00 AM

  • Tweet

Networks – the fundamental backbone of all technology in business.

 

Historically, only large law firms have had the means and capacity to implement always available, highly redundant, robust networks. As the Internet becomes more prevalent in every facet of business – from online research tools to cloud computing – ensuring network infrastructure has the above capabilities is a necessity for all firms. Fortunately, technology has matured and costs have decreased, allowing small and midsize law firms access to this previously exclusive technology.

 

Selecting the right network equipment and design is a tremendous responsibility. Below are some tips to help law firms decide on the most appropriate network infrastructure.

 

Download the rest of this free article for help building a long-lasting, resilient network infrastructure for your law firm. 

Read More

Topics: Security, Malware, Technology Consulting, Cloud, IT Tips, ECM, Disaster Recovery, DMS, Network

So Your SAN is Full . . .

Posted by Derk Shelly

December 8, 2015 1:40 PM

  • Tweet

Storage choices are expanding almost as fast as is our ability to fill them up. Due to the mission-critical nature of what law firms store, they require reliability, fault tolerance and scalability. However, the price tag to add a few more terabytes of storage to a system can be daunting to some.  

 

Adding additional SAN nodes is the first and, for me, most obvious answer. 

 

Installing new SAN nodes can be added to a storage cluster with no downtime, giving law firms a seamless expansion in storage capacity. This was, after all, one of the reasons you bought SAN storage in the first place, right?

 

There are other options, though.

Read More

Topics: Training, Technology Consulting, Data Backups, Data Recovery, IT Tips, Cloud Storage, Disaster Recovery

Planning Like It's 1999

Posted by William Pate

November 24, 2015 2:47 PM

  • Tweet

As the end of the year rapidly approaches, we think back to the much-touted but over-hyped threat of the millennial bug destroying massive amounts of data and information. While we laugh at our overreaction 15 years ago, when it comes to information security, there is no true overreaction. Cyberattacks, earthquakes, fires, explosions, power outages and so many more events can immediately render your data unavailable — sometimes for good.

To mitigate that risk, we partner with Acronis to provide backup, disaster recovery and secure access solutions to our legal technology clients.

Read More

Topics: Malware, Managed Services, Data Backups, Cloud Storage, Partner Series, Disaster Recovery

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (130)
  • IT Tips (89)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.