• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Is Your Firm Secure?

Posted by William Pate

March 13, 2018 3:14 PM

  • Tweet

Hackers' methods continue to evolve. That means your security must evolve. 

To adequately protect your firm, you need:

Read More

Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall

[INFOGRAPHIC] Where is the Best Place to Store Your Data?

Posted by William Pate

August 23, 2016 1:20 PM

  • Tweet

When you consider the best place(s) to store your data – in the cloud, on-premises in your office or some hybrid of the two – what questions do you ask?

Read More

Topics: Cloud, Data Backups, Cloud Storage, Disaster Recovery, Network, Access Control, cybersecurity, Cybercrime

[INFOGRAPHIC] 5 Best Practices for Improving Law Firm Security

Posted by William Pate

August 3, 2016 5:02 PM

  • Tweet

We know during the lazy days people can become a bit lax in following security protocols. We wanted to share this infographic to help you and your firm stay vigilant and safe this summer.

Read More

Topics: Technology Consulting, IT Tips, Network, cybersecurity, Infographic, Cybercrime, Cybersecurity Infographic

Law Firm Cybersecurity Tips: Advanced Persistent Threats

Posted by William Pate

March 29, 2016 8:00 AM

  • Tweet

As we wrap up this series of Law Firm Cybersecurity Tips, remember that we're always keeping an eye out and keeping you up-to-date on new threats to your law firm. For our final post in the series, we'll discuss a very dangerous threat to law firms.

A highly destructive —  to information as well as physical security — threat is the Advanced Persistent Attack (APT).

These threats come in several different forms. They are stealthy and determined in their attempts to compromise data. They can be simple, such as a rogue administrator account hiding in an obscure organizational unit in your Active Directory (you are checking who has membership to domain administrative and enterprise administrators, right?), ranging to the better-known Trojan-horse attacks. Some of these viruses sit on your computer or server silently collecting your data for months.

The Stuxnet computer worm is a famous example. While this threat was originally intended to target Iran’s nuclear capabilities, hackers discovered the source code and re-engineered it to use against individuals and corporations.

Read More

Topics: Security, Malware, IT Tips, Network, SentinelOne, cybersecurity, Advanced Persistent Threats, Endpoint Protection, APTs

Law Firm Cybersecurity Tips: Law Firms and Security Education

Posted by William Pate

March 15, 2016 3:23 PM

  • Tweet

As the number and types of cyber-threats multiply, regularly updated security policies must be developed and additional training provided to ensure law firms' users are aware of such threats and how to avoid them. Unfortunately, there is usually a disagreement between users and IT staff about users knowledge and ability to recognize and circumvent an attack.

There is a distinct divide between what IT administrators feel about security and the impressions of a law firm’s general users. While most administrators feel users need more training to better recognize security-compromising events, i.e., email phishing attempts, many end users feel they are already able to spot when they are the victim of a sophisticated phishing attempt. It is important that the firm’s IT department and managing team are on the same page when it comes to information security and the amount of training required to support the firm’s directives and legal and ethical requirements.

Read More

Topics: Security, Malware, IT Tips, Network, whaling, cybersecurity, Ransomware, phishing

Law Firm Cybersecurity Tips: Don't Just Set It and Forget It

Posted by William Pate

March 8, 2016 4:01 PM

  • Tweet

Wouldn't it be nice if security threats remained the same? We would only have to implement a single type of protection for each risk -- and that's that. No need for a deadbolt because the regular doorknob lock works. Car alarms were never invented because door locks worked fine. Cybercriminals couldn't shut down your network or ransom your files because you had anti-virus software installed.

 

Unfortunately, that is fantasyland. However, sometimes we treat our networks and endpoints as if they operate in that idealized world.

 

Read More

Topics: Security, Malware, IT Tips, Network, whaling, cybersecurity, Ransomware, phishing

Don't Let Your Law Firm Become Whale Bait

Posted by Tim Sheehan

February 22, 2016 3:55 PM

  • Tweet

UPDATE 1 MAR 2016: Our partners at Mimecast announced today at the RSA Conference that they are launching the first-ever threat protection against whaling. Learn more here.

 

Whaling Attack? No, it’s not the latest survivalist reality television show. It’s a potential hacking threat posing a real problem for today’s technologically driven law firms and companies. [Update 29 FEB 2016: Here are a few good, if sad, examples of whaling.]

As in reality, whales are bigger than phish. Phishing is usually conducted using shotgun-style emails sent to the masses looking for people to divulge sensitive information, like Social Security Numbers or other personally identifiable information (PII). A whaling attack, however, targets the C-suite, partners, upper management, celebrities and other individuals of high worth or influence.

Read More

Topics: Security, Malware, Technology Consulting, IT Tips, Disaster Recovery, Email Management, Network, SentinelOne, whaling, cybersecurity, phishing

Turn On New Mimecast Email Security Features

Posted by William Pate

February 4, 2016 4:49 PM

  • Tweet

Our partner Mimecast has shared their newest defenses against email threats – and what you need to do to ensure they are actively protecting your systems. Some of these steps may be somewhat complex to the non-Exchange Administrator. If you need help getting started, please contact us.

Read More

Topics: Security, Malware, Technology Consulting, IT Tips, Email Management, Network, Mimecast

A Legal Administrators’ Guide to Choosing a Business VoIP Phone System

Posted by William Pate

February 2, 2016 8:00 AM

  • Tweet
Read More

Topics: Technology Consulting, Cloud, IT Tips, videoconferencing, Network

Evaluating and Selecting the 4 Most Important Facets of Network Technologies for Your Law Firm

Posted by Eric Hoffmaster

January 19, 2016 8:00 AM

  • Tweet

Networks – the fundamental backbone of all technology in business.

 

Historically, only large law firms have had the means and capacity to implement always available, highly redundant, robust networks. As the Internet becomes more prevalent in every facet of business – from online research tools to cloud computing – ensuring network infrastructure has the above capabilities is a necessity for all firms. Fortunately, technology has matured and costs have decreased, allowing small and midsize law firms access to this previously exclusive technology.

 

Selecting the right network equipment and design is a tremendous responsibility. Below are some tips to help law firms decide on the most appropriate network infrastructure.

 

Download the rest of this free article for help building a long-lasting, resilient network infrastructure for your law firm. 

Read More

Topics: Security, Malware, Technology Consulting, Cloud, IT Tips, ECM, Disaster Recovery, DMS, Network

Information Governance & the Law Firm Technology that Supports It

Posted by Tim Van Bourg

January 12, 2016 8:00 AM

  • Tweet

Law firms need to know where their intellectual property is at all times. They also need the ability to track who has accessed what data from where and what they did to it. Most important, they need the ability to lockdown information that should never leave the firm’s physical or digital walls.

Read More

Topics: Security, Technology Consulting, IT Tips, ECM, Information Governance, Network

Controlling Access to Confidential Law Firm Content

Posted by Derk Shelly

January 5, 2016 8:00 AM

  • Tweet

Controlling access to law firms’ physical and information assets is the cornerstone of information technology security (aka cybersecurity). The primary reason for implementing an access control program is to ensure the availability, integrity and confidentiality of the data on law firms’ systems. 

Read More

Topics: Security, Technology Consulting, Cloud, IT Tips, ECM, Network

All posts

Comment on this post

Recent Posts

Categories

  • cybersecurity (132)
  • IT Tips (90)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (22)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Document Management (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Cybersecurity Infographic (5)
  • Dual Factor Authentication (5)
  • Federal Trade Commission (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Remote Access (4)
  • Windows 10 (4)
  • Word (4)
  • iManage Work (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Identity Management (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Real Estate (1)
  • Recipient Checking (1)
  • Remote Work (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • Work from Home (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.