January 19, 2020 2:45 AM
January 18, 2020 12:00 AM
January 17, 2020 4:30 AM
January 16, 2020 12:45 AM
January 15, 2020 12:30 AM
December 5, 2019 10:43 AM
March 13, 2018 3:14 PM
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
September 20, 2017 9:01 AM
Everyone knows by now that it's important to have a strong password. But how do you know if yours is strong enough?
August 8, 2017 9:26 AM
Has your password been stolen? Are you worried one of your firms' email addresses has been compromised?
There's an easy way to find out.
May 22, 2017 2:22 PM
May 18, 2017 1:37 PM
Read our CTO Mike Paul's article in Legal Ink Magazine!
May 8, 2017 9:17 AM
Our CTO, Mike Paul, offers our path to two-factor authentication, and why you should follow your own path to enhanced security with 2FA.
Over the next few weeks, Mike will tell our story and offer advice on moving to 2FA.
Innovative Computing Systems is a managed service provider with over 300 clients. Frequently, we become our client’s trusted resource for all things IT. One of the challenges that we have, as most organizations do, relates to password management.
February 3, 2017 10:05 AM
January 3, 2017 10:50 AM
You've heard about the Yahoo! hacks and millions of compromised user passwords and data, but have you heard about the follow-on Yahoo! technical support scam?
September 22, 2016 5:12 PM
We wanted to inform you of a serious security breach at Yahoo!
Earlier today, Yahoo! issued a press release stating that 500 million users' accounts were breached in a 2014 hack of their systems. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information.
Yahoo! said in the press release that:
A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network.
If you were a victim of the attack, we encourage you to review these steps you can take to file a report and help protect yourself from identity theft.
Yahoo! also recommends – as we do, too – that users take advantage of two-factor authentication to provide an extra layer of security to their Yahoo! accounts.
Yahoo! is not what we would consider a best-of-breed solution for email or other business matters. If you would like to discuss more enterprise-level, law firm standard solutions, please email email@example.com or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in-depth.