• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

31 Days of Law Firm Data Security: Day 28 | Outlook Web Access

Posted by William Pate

January 28, 2020 12:45 AM

  • Tweet

Lock down Outlook Web Access.

Read More

Topics: Email Management, Access Control, cybersecurity, Email Security, 31 Days of Law Firm Data Security

31 Days of Law Firm Data Security: Day 23 | Spam Filters

Posted by William Pate

January 23, 2020 12:15 AM

  • Tweet

Filter spam.

 

Read More

Topics: Email Management, cybersecurity, phishing, Email Security, 31 Days of Law Firm Data Security

What To Do When Your Email is Compromised

Posted by Patrick Roman

June 7, 2018 3:00 PM

  • Tweet

Here's a quick checklist of things you should do when your email has been compromised.

Read More

Topics: Email Management, cybersecurity, phishing, Email Security

How Phishing Campaigns Targeting Law Firms Have Changed

Posted by William Pate

May 22, 2018 12:52 PM

  • Tweet

Recent research has shown changes in the effectiveness of various phishing attacks.

Cofense, previously PhishMe, issued a report based on 1,400 clients in 23 industries in more than 50 countries that notes that 7.5 million phishing emails were reported in 2017 alone. But the effectiveness of phishing campaigns has shifted.

In prior research, users were most emotionally motivated to open emails that made them feel a sense of urgency, fear or opportunity. Those three emotional motivators have now been replaced with entertainment, social and reward/recognition.

Read More

Topics: Security, Training, cybersecurity, Ransomware, Hacking, phishing, Cybercrime, Email Security, Information Security

Email Management for Law Firms: Classifying Emails

Posted by Michael Kemps

May 17, 2018 4:53 PM

  • Tweet

Even though email is as ubiquitous at law firms as it is in other industries, few legal professionals pay adequate attention to the importance of effectively managing their emails. In a series of blog posts, we will look at the importance of classifying emails, archiving emails, mailbox management, getting legal professionals to comply with email management policies, data security practices, handling emails for departing attorneys or matter release and email retention and destruction.

Read More

Topics: DMS, Email Management, Document Management, Microsoft, Office 365, Email Security, Outlook

Keep Your Law Firm Safer than Atlanta

Posted by William Pate

April 3, 2018 1:20 PM

  • Tweet

A recent ransomware attack against the city of Atlanta took its computers offline for over a week while city officials, along with the FBI, attempted to remedy the situation without paying the hackers $51,000 in Bitcoin. 

Read More

Topics: cybersecurity, Ransomware, Cybercrime, Email Security, Information Security

New Feature: Recipient Checking to Stop Emails Being Sent to the Wrong Person

Posted by William Pate

March 28, 2018 3:13 PM

  • Tweet

We thank our partners at DocsCorp for sharing this blog post about the new release of cleanDocs 2.1. cleanDocs is a breakthrough technology that removes metadata from Microsoft Office, PDF and ZIP files at sub-second speeds.

Read More

Topics: Partner Series, DocsCorp, Email Management, cleanDocs, Email Security, Recipient Checking

Is Your Firm Secure?

Posted by William Pate

March 13, 2018 3:14 PM

  • Tweet

Hackers' methods continue to evolve. That means your security must evolve. 

To adequately protect your firm, you need:

Read More

Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall

ALERT: Highly Effective Email Phishing Campaign Detected

Posted by William Pate

February 28, 2018 2:09 PM

  • Tweet

We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses. 

Read More

Topics: Security, Alerts, Email Management, cybersecurity, Hacking, phishing, Cybercrime, Email Security, Information Security, Identity Theft

Has your password been stolen?

Posted by William Pate

August 8, 2017 9:26 AM

  • Tweet

Has your password been stolen? Are you worried one of your firms' email addresses has been compromised? 

 

There's an easy way to find out. 

Read More

Topics: Email Management, Passwords, Two Factor Authentication, Email Security, 2FA

You Need an Action Plan for the GDPR

Posted by William Pate

June 22, 2017 10:26 AM

  • Tweet

We're very appreciative to our partners at Mimecast for sharing this report from Forrester. We hope it will help you prepare for the GPDR. 

 

Read More

Topics: Email Management, cybersecurity, Email Security, GPDR

Fortinet 2017 SMB Preferences Infographic

Posted by William Pate

May 22, 2017 2:22 PM

  • Tweet
Read More

Topics: Email Management, cybersecurity, Passwords, Two Factor Authentication, Email Security, 2FA, Information Security, firewall

eBook: Defining Security for Today's Cloud Environment

Posted by William Pate

March 7, 2017 5:08 PM

  • Tweet

Read More

Topics: Cloud, Email Management, cybersecurity, Email Security, Fortinet

Ransomware Targeting Law Firms and How to Defend Your Firm

Posted by Crag Bogner, Systems Engineer

December 22, 2016 1:05 PM

  • Tweet

At the end of each year, the organizations publishing dictionaries release terms that will be included in their next editions. Terms that would have been nonsensical just years ago become commonplace. One word has been hiding just below the surface of our everyday conversation. It is terrifying in terms of scope and mortifying in terms of transmission. I speak of the word “ransomware.”

Read More

Topics: Security, SentinelOne, cybersecurity, Ransomware, Cybercrime, Email Security, Information Security

Update on Cyberattacks Against Law Firms

Posted by William Pate

December 9, 2016 1:29 PM

  • Tweet

News this week that a series of cyberattacks and data breaches at North American law firms in 2015 was worse than initially reported (isn't that always the case?) was seemingly timed with the release of a bevy of new articles and information sheets on cybersecurity by our staff.

Read More

Topics: Security, Technology Consulting, Cloud, IT Tips, cybersecurity, Cybercrime, Email Security, Articles, Information Security

All posts Next

Comment on this post

Recent Posts

Categories

  • cybersecurity (131)
  • IT Tips (90)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Document Management (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • Federal Trade Commission (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Remote Access (4)
  • Windows 10 (4)
  • Word (4)
  • iManage Work (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Real Estate (1)
  • Recipient Checking (1)
  • Remote Work (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • Work from Home (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.