• Client Portal
    • Support
    • Contact Us
    • 1.800.541.0450
    • Request a Free Consultation
ICS_Logo_transparent.png
  • Practice Groups
  • Services
  • Partners
  • About Us
  • News & Events
  • Resources
  • Blog
Innovative Insights

Where Law Firm IT Budgets Should Focus in 2021

Posted by William Pate

November 18, 2020 4:59 PM

  • Tweet

Don't miss Innovative founder and CEO Michael Kemps' latest essay with advice on legal technology budget planning for 2021 in Legaltech News:

Read More

Topics: Technology Consulting, Cloud, Articles, Business Continuity

Important Microsoft Windows 10 Licensing Updates

Posted by Greg Russo

October 2, 2020 2:04 PM

  • Tweet

With all of our clients upgraded to Windows 10, we wanted to address some common questions about the Operating System and the new ways in which Microsoft is supporting the product. Gone are the days of the past where Microsoft would release a new version of an operating system every 5 years, opting instead to make incremental improvements to Windows 10 indefinitely.

Read More

Topics: Technology Consulting, Windows 10, Microsoft, EOL, Licensing

The Benefits of Moving More of Everything to the Cloud for Law Firms

Posted by William Pate

October 1, 2020 4:04 PM

  • Tweet

 

Read More

Topics: Technology Consulting, Cloud, SMB

Citrix Perpetual Licensing Update

Posted by William Pate

August 19, 2020 2:59 PM

  • Tweet

Citrix recently informed Partners that they are retiring their perpetual licensing model and replacing it with a subscription-based model. 

Read More

Topics: Technology Consulting, Alerts, Citrix

iManage Update Required by Oct. 1, 2020

Posted by William Pate

August 19, 2020 2:41 PM

  • Tweet

Please be advised that clients using Macs to access iManage must update their clients by October 1, 2020 to address certificate expirations due for versions 10.1.3 to 10.2.3 of Work Desktop for Mac.1

Read More

Topics: Technology Consulting, Alerts

☣ Plan for Coronavirus Impacts

Posted by William Pate

February 19, 2020 4:45 PM

  • Tweet

In an effort to keep you abreast of ongoing developments that could impact your firm's technology, we wanted to alert you to increasing likelihood of disruptions to major IT manufacturers' supply chains due to the Coronavirus outbreak in Asia.

Read More

Topics: Security, Technology Consulting, IT Tips, Alerts, Disaster Recovery

Our Most Popular Blog Post of 2019: iManage RAVN

Posted by William Pate

December 19, 2019 2:30 PM

  • Tweet

Our most popular blog post this year was a look at our long-time partner iManage's RAVN software. With an eye toward its usefulness for legal professionals, senior consultant Brian Piatek explained what the software does:

Read More

Topics: Technology Consulting, iManage, Document Management, iManage RVAN

Top 5 Blog Posts of 2019: #2 Our 30th Anniversary

Posted by William Pate

December 16, 2019 2:24 PM

  • Tweet

In our second most popular blog post this year, we celebrated our 30th anniversary by reflecting on the changes we've seen in the legal technology industry since Innovative Computing Systems opened for business. 

Read More

Topics: Technology Consulting, Business Continuity, Anniversary

Top 5 Blog Posts of 2019: #3 Security Summit Webcast

Posted by William Pate

December 12, 2019 4:24 PM

  • Tweet

In mid-2019, we held our first online security summit bringing together legal, cybersecurity and IT professionals to discuss law firms' responsibility to manage cybersecurity, including risk management, potential future threats and steps firms should take to ensure the security of their firms' and clients' data. Our third most popular blog post from 2019 was the invitation to the summit. 

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, phishing, Business Continuity

Top 5 Blog Posts of 2019: #4 Personal Phishing Attack

Posted by William Pate

December 10, 2019 5:44 PM

  • Tweet

Our fourth most popular blog of 2019 falls outside the strict theme of "business continuity" as it was a recount of a personal phishing attack I experienced (and have experienced again since). Nonetheless, it is just these personal attacks that lead to cybersecurity breaches of larger organizations. In fact, cybercriminals are often able to reuse the credentials they discover in successful cyberattacks against individuals' personal data to access corporate and other accounts. 

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, phishing, Business Continuity

Three Tech Tips for 2020

Posted by William Pate

December 5, 2019 10:43 AM

  • Tweet

Prepare your technology for a safe and productive 2020 by:

Read More

Topics: Technology Consulting, IT Tips, cybersecurity, Passwords, HackNotice

New California Consumer Privacy Law Open to Public Comment

Posted by William Pate

October 16, 2019 7:45 AM

  • Tweet

Last week, California Attorney General Xavier Becerra released to the public  proposed regulations under the California Consumer Privacy Act (CCPA).

Read More

Topics: Technology Consulting, cybersecurity, CCPA

8 Steps to Take After a Cyberattack

Posted by William Pate

July 3, 2019 11:52 AM

  • Tweet

Everyone needs to know what to do in the event of a successful cyberattack.

Read More

Topics: Security, Training, Technology Consulting, cybersecurity, Ransomware, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, Cybercrime, Publications, Articles, Information Security

Enhanced Cybersecurity: Why You Need an MSP

Posted by William Pate

August 28, 2018 11:11 AM

  • Tweet
The only thing to be afraid of when it comes to cybersecurity is not having a plan.

 

Read More

Topics: Security, Technology Consulting, Managed Services, cybersecurity, Two Factor Authentication, 2FA, Information Security

Two More iManage Tips

Posted by Sharee Schuchardt

August 20, 2018 8:15 PM

  • Tweet

For our final (for now) post on common iManage questions, we offer two more quick tips. 

Read More

Topics: Technology Consulting, IT Tips, iManage

All posts Next

Comment on this post

Recent Posts

Categories

  • cybersecurity (126)
  • IT Tips (89)
  • Technology Consulting (73)
  • Security (55)
  • Cybercrime (44)
  • 31 Days of Law Firm Data Security (33)
  • Cloud (31)
  • Training (31)
  • Malware (26)
  • Information Security (23)
  • Passwords (21)
  • Email Management (20)
  • Email Security (19)
  • Ransomware (18)
  • Cloud Storage (17)
  • phishing (17)
  • Alerts (16)
  • Hacking (16)
  • 2FA (15)
  • Two Factor Authentication (15)
  • Disaster Recovery (14)
  • Webinars (14)
  • iManage (14)
  • Articles (13)
  • Data Backups (12)
  • Network (12)
  • ECM (11)
  • Managed Services (11)
  • Microsoft (11)
  • DMS (9)
  • ILTA (9)
  • Information Governance (9)
  • CCPA (8)
  • End of Support (8)
  • Endpoint Protection (8)
  • Partner Series (8)
  • whaling (8)
  • Business Continuity (7)
  • End of Life (7)
  • Office 365 (7)
  • SentinelOne (7)
  • ALA (6)
  • Data Recovery (6)
  • DocsCorp (6)
  • Document Management (6)
  • Employment (6)
  • Infographic (6)
  • Partners (6)
  • Privacy (6)
  • Access Control (5)
  • Antivirus (5)
  • COVID-19 (5)
  • Dual Factor Authentication (5)
  • APTs (4)
  • Client Audits (4)
  • Consumer Privacy (4)
  • Cybersecurity Infographic (4)
  • Enterprise Mobility Management (4)
  • FBI Internet Crime Complaint Center (4)
  • Federal Trade Commission (4)
  • Innovative Cloud Solution (4)
  • Mimecast (4)
  • Mobile (4)
  • Publications (4)
  • Windows 10 (4)
  • Word (4)
  • Cloud Infographic (3)
  • Duo (3)
  • Events (3)
  • Microsoft SQL Server (3)
  • Our Team (3)
  • PII (3)
  • Penetration Testing (3)
  • Remote Access (3)
  • Secret Service (3)
  • Survey (3)
  • US-CERT (3)
  • Virus (3)
  • Windows 7 (3)
  • Yahoo (3)
  • cleanDocs (3)
  • iManage Work (3)
  • videoconferencing (3)
  • ALA 2016 (2)
  • ALA 2017 (2)
  • AWS (2)
  • Advanced Persistent Threats (2)
  • Association of Legal Administrators (2)
  • Biometric Authentication (2)
  • Change Management (2)
  • EOL (2)
  • ESU (2)
  • Fortinet (2)
  • GLA ALA (2)
  • HackNotice (2)
  • Hashcat (2)
  • Hybrid Storage (2)
  • IC3 (2)
  • Identity Theft (2)
  • Microsoft SQL Server 2005 (2)
  • Microsoft SQL Server 2008 (2)
  • Microsoft SQL Server 2016 (2)
  • Mine (2)
  • Office 2016 (2)
  • On-Premises Storage (2)
  • Regulation (2)
  • SMB (2)
  • Server 2008 (2)
  • Staff (2)
  • Video (2)
  • Videos (2)
  • Vulnerability Testing (2)
  • firewall (2)
  • iManage RVAN (2)
  • ABA (1)
  • About Us (1)
  • Amazon Web Services (1)
  • Anniversary (1)
  • Austin ALA (1)
  • BYOD (1)
  • Blue Jeans (1)
  • Cindy Bates (1)
  • Citadel Information Group (1)
  • Citrix (1)
  • Cloud Communications (1)
  • Customer Service (1)
  • David Lam (1)
  • ELF (1)
  • EMM (1)
  • EMP for Windows Server (1)
  • Employment Law Forum (1)
  • Financing (1)
  • First American Equipment Finance (1)
  • GLA (1)
  • GPDR (1)
  • Golden Gate ALA (1)
  • HPE (1)
  • Hiring (1)
  • IBM (1)
  • Imaging (1)
  • Innovative Computing Systems Family (1)
  • Internet Explorer (1)
  • Internet of Things (1)
  • IoT (1)
  • KnowBe4 (1)
  • LawToolBox (1)
  • Licensing (1)
  • Los Angeles (1)
  • MaaS360 (1)
  • Michael Kemps (1)
  • Microsoft Edge (1)
  • Microsoft SQL Server 2014 (1)
  • Mitel (1)
  • Outlook (1)
  • PDFs (1)
  • Phones (1)
  • Pokémon GO (1)
  • Printers (1)
  • Privacy.com (1)
  • RSA Conference (1)
  • Recipient Checking (1)
  • Servers (1)
  • Threat Map (1)
  • Unified Communications (1)
  • User Experience (1)
  • Virtualization (1)
  • Work Product Management (1)
  • compareDocs (1)
  • eBook (1)
  • macOS (1)
  • pdfDocs (1)
  • zoom (1)
see all

Subscribe to Innovative Insights

  • Cloud Solutions
    Cybersecurity
    Managed IT Services
    IT Consulting
    Enterprise Servers & Storage
    Enterprise Content Management
  • Telephony & Networking
    Desktop Management
    Desktop Deployment
    Audits & Strategy
    Virtualization
Practice Groups
Services
Partners
About Us
News & Events
Resources
Blog
Employment
Privacy Policy
ICSLogo_Footer
Copyright © 1989–2021. Innovative Computing Systems, Inc.