• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

National Tax Security Awareness Week opens with warnings as holidays, 2021 tax season approach

Posted by William Pate

November 30, 2020 10:33 AM

  • Tweet

The Internal Revenue Service and its Security Summit partners today issued warnings to all taxpayers and tax professionals to beware of scams and identity theft schemes by criminals taking advantage of the combination of holiday shopping, the approaching tax season and coronavirus concerns.

Read More

Topics: Security, cybersecurity

Treasury Department Warning on Ransomware Attacks & Payments

Posted by William Pate

October 12, 2020 2:01 PM

  • Tweet

 

Read More

Topics: Security, cybersecurity, Ransomware, Information Security, Privacy

☣ Plan for Coronavirus Impacts

Posted by William Pate

February 19, 2020 4:45 PM

  • Tweet

In an effort to keep you abreast of ongoing developments that could impact your firm's technology, we wanted to alert you to increasing likelihood of disruptions to major IT manufacturers' supply chains due to the Coronavirus outbreak in Asia.

Read More

Topics: Security, Technology Consulting, IT Tips, Alerts, Disaster Recovery

8 Steps to Take After a Cyberattack

Posted by William Pate

July 3, 2019 11:52 AM

  • Tweet

Everyone needs to know what to do in the event of a successful cyberattack.

Read More

Topics: Security, Training, Technology Consulting, cybersecurity, Ransomware, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, Cybercrime, Publications, Articles, Information Security

Enhanced Cybersecurity: Why You Need an MSP

Posted by William Pate

August 28, 2018 11:11 AM

  • Tweet
The only thing to be afraid of when it comes to cybersecurity is not having a plan.

 

Read More

Topics: Security, Technology Consulting, Managed Services, cybersecurity, Two Factor Authentication, 2FA, Information Security

How Phishing Campaigns Targeting Law Firms Have Changed

Posted by William Pate

May 22, 2018 12:52 PM

  • Tweet

Recent research has shown changes in the effectiveness of various phishing attacks.

Cofense, previously PhishMe, issued a report based on 1,400 clients in 23 industries in more than 50 countries that notes that 7.5 million phishing emails were reported in 2017 alone. But the effectiveness of phishing campaigns has shifted.

In prior research, users were most emotionally motivated to open emails that made them feel a sense of urgency, fear or opportunity. Those three emotional motivators have now been replaced with entertainment, social and reward/recognition.

Read More

Topics: Security, Training, cybersecurity, Ransomware, Hacking, phishing, Cybercrime, Email Security, Information Security

Is Your Firm Secure?

Posted by William Pate

March 13, 2018 3:14 PM

  • Tweet

Hackers' methods continue to evolve. That means your security must evolve. 

To adequately protect your firm, you need:

Read More

Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall

ALERT: Highly Effective Email Phishing Campaign Detected

Posted by William Pate

February 28, 2018 2:09 PM

  • Tweet

We have recently been made aware of a sophisticated email phishing campaign targeting law firms and other businesses. 

Read More

Topics: Security, Alerts, Email Management, cybersecurity, Hacking, phishing, Cybercrime, Email Security, Information Security, Identity Theft

Beat the Identity Thieves — File Your Taxes Early

Posted by William Pate

February 26, 2018 12:54 PM

  • Tweet

It's that time again — time to file your taxes early so criminals don't do it for you and steal your possible refunds. This is of special importance after the recent Equifax hack in which most Americans' personal information, including Social Security Numbers, was accessed by criminals. The most effective defense is to file your taxes early — before identity thieves have the chance to do it for you. 

Read More

Topics: Security, Alerts, Hacking, phishing, PII, Cybercrime, Identity Theft

Enhanced Information Security | Tip #4

Posted by William Pate

March 23, 2017 5:51 PM

  • Tweet

Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhanced information security. Read the first few tips here, here and here. 

Read More

Topics: Security, IT Tips, cybersecurity, Cybercrime

Enhanced Information Security | Tip #3

Posted by William Pate

March 3, 2017 3:36 PM

  • Tweet

Have you been following along and applying these tips over the past couple of weeks? If so, you've probably noticed they're quick and easy steps to enhance information security. Read the first two tips here and here. 

Read More

Topics: Security, IT Tips, cybersecurity, Cybercrime

Ransomware Targeting Law Firms and How to Defend Your Firm

Posted by Crag Bogner, Systems Engineer

December 22, 2016 1:05 PM

  • Tweet

At the end of each year, the organizations publishing dictionaries release terms that will be included in their next editions. Terms that would have been nonsensical just years ago become commonplace. One word has been hiding just below the surface of our everyday conversation. It is terrifying in terms of scope and mortifying in terms of transmission. I speak of the word “ransomware.”

Read More

Topics: Security, SentinelOne, cybersecurity, Ransomware, Cybercrime, Email Security, Information Security

Update on Cyberattacks Against Law Firms

Posted by William Pate

December 9, 2016 1:29 PM

  • Tweet

News this week that a series of cyberattacks and data breaches at North American law firms in 2015 was worse than initially reported (isn't that always the case?) was seemingly timed with the release of a bevy of new articles and information sheets on cybersecurity by our staff.

Read More

Topics: Security, Technology Consulting, Cloud, IT Tips, cybersecurity, Cybercrime, Email Security, Articles, Information Security

Yahoo! Hacked — Change Your Password Now

Posted by William Pate

September 22, 2016 5:12 PM

  • Tweet

We wanted to inform you of a serious security breach at Yahoo!

 

Earlier today, Yahoo! issued a press release stating that 500 million users' accounts were breached in a 2014 hack of their systems. Account information accessed includes usernames and passwords, security questions and answers and other confidential user information. 

 

Yahoo! said in the press release that: 

 

A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo! believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network.


If you were a victim of the attack, we encourage you to review these steps you can take to file a report and help protect yourself from identity theft. 

 

Yahoo! also recommends – as we do, too – that users take advantage of two-factor authentication to provide an extra layer of security to their Yahoo! accounts. 


Yahoo! is not what we would consider a best-of-breed solution for email or other business matters. If you would like to discuss more enterprise-level, law firm standard solutions, please email sales@innovativecomp.com or call 1.800.541.0450, and one of our professional Account Executives will be happy to discuss security and file sharing with you in-depth.

Read More

Topics: Security, Dual Factor Authentication, cybersecurity, Passwords, Two Factor Authentication, Hacking, Email Security, Yahoo, 2FA

Security in the Cloud

Posted by William Pate

September 13, 2016 2:18 PM

  • Tweet

Moving to the cloud is an important decision. Let our CEO Michael Kemps walk you through important security aspects of the cloud in his new article.

Read More

Topics: Security, Cloud, Cloud Storage, cybersecurity, Cybercrime, Articles

All posts Next

Comment on this post

Recent Posts

Categories

  • cybersecurity (131)
  • IT Tips (90)
  • Technology Consulting (75)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (34)
  • Training (33)
  • Cloud (31)
  • Malware (28)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • phishing (18)
  • Cloud Storage (17)
  • Hacking (17)
  • Alerts (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Microsoft (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • Business Continuity (8)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Document Management (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • COVID-19 (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • Dual Factor Authentication (5)
  • Federal Trade Commission (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Remote Access (4)
  • Windows 10 (4)
  • Word (4)
  • iManage Work (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Vulnerability Testing (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • eBook (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Real Estate (1)
  • Recipient Checking (1)
  • Remote Work (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • Work from Home (1)
  • compareDocs (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.