Everyone needs to know what to do in the event of a successful cyberattack.
July 3, 2019 11:52 AM
Topics: Security, Training, Technology Consulting, cybersecurity, Ransomware, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, Cybercrime, Publications, Articles, Information Security
May 22, 2018 12:52 PM
Recent research has shown changes in the effectiveness of various phishing attacks.
Cofense, previously PhishMe, issued a report based on 1,400 clients in 23 industries in more than 50 countries that notes that 7.5 million phishing emails were reported in 2017 alone. But the effectiveness of phishing campaigns has shifted.
In prior research, users were most emotionally motivated to open emails that made them feel a sense of urgency, fear or opportunity. Those three emotional motivators have now been replaced with entertainment, social and reward/recognition.
March 13, 2018 3:14 PM
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
November 23, 2016 10:03 AM
Our partners at SentinelOne recently reported that 50 percent of organizations have been victim to cyberattacks. Eighty-five percent of those said they had been attacked three or more times.
May 3, 2016 4:17 PM
It's happened. You've done everything you can to defend your law firm from this day, but the hacker successfully breached your walls. Now, you're faced with encrypted files, lost confidential data, demands for money, the insertion of other forms of malware on your network or, even worse, some combination of these and/or more malicious activities or demands.
What do you do now? Who needs to know? Who are you gonna call?
Topics: Security, Training, Malware, IT Tips, Email Management, whaling, cybersecurity, Hashcat, Passwords, Hacking, phishing, Virus, Antivirus, FBI Internet Crime Complaint Center, US-CERT, IC3, Secret Service, PII, Federal Trade Commission, APTs, Cybercrime
April 5, 2016 10:41 AM
Ransomware, in layman’s terms, is designed to extort money from law firms, companies and individuals by holding their data hostage. CryptoLocker (and its variants) is a type of ransomware that infects a computer and seeks out common data files, such as pictures, music, PDFs and Word and Excel documents. It then encrypts those files so the user can’t open them, leaving the victim two choices: pay the cybercriminal or lose the data.
Need an example? Check out what happened to the Town of Discovery Bay, Calif., when its network was compromised by CryptoLocker.
Unfortunately, it only takes one wrong click to become a victim. Thus, ransomware prevention is crucial for law firms of any size holding confidential information. And what law firm isn't?
Download and use our 10 Steps to Ransomware Prevention:
A Checklist for Managing Computer Vulnerabilities to help ensure your law firm can survive a ransomware attack.
March 30, 2016 7:29 PM
One click. That's all it took. One single click.
All the law firm's data. All of it. Gone. Encrypted. Corrupted. The best you can hope for is that you get
March 24, 2016 8:42 PM
So what does someone need to know about the annual RSA Conference? Most technical people know about it. However, as an account executive, I felt it was important for me to understand what the acronym “RSA” stands for. In my defense, I was a first-time attendee. But I wanted to know what kind of group I’d become involved with, and I figured knowing the meaning behind the acronym would give me a pretty good idea. Now, if you’re not a real techie, you probably don’t know the answer to my question. In fact, many people I talked to didn’t know. That made me feel better. I wasn’t alone in my ignorance. I went on a personal search to find out.
February 25, 2016 4:46 PM
We have been partners with iManage since their beginnings. Through thick and thin, iManage has remained a best-of-breed partner in document management solutions. We are extremely happy to be hosting them in our newest partner webinar, in which we will examine the latest and greatest features of iManage Work 9.3.
iManage is the market-leading work product management solution for professionals. The iManage solution helps law firms serve their clients more effectively by enabling the creation, sharing, governance and security of work product on one simple, secure platform.
January 15, 2016 11:00 AM
WHAT: Free Webinar on DocsCorp's compareDocs and cleanDocs
WHEN: 27 JAN 2016
12 PM PST/1 PM MST
2 PM CST/3 PM EST
Document comparison and metadata cleaning are so frequently part of the same workflow in legal document management that it makes perfect sense to use solutions that integrate seamlessly with each other and your document management system (DMS).
When you compare two documents for differences, making sure that the final version is cleaned of comments and track changes before emailing is crucial to information security.
December 29, 2015 10:08 AM
My company has been helping law firms design, implement and support innovative legal technologies for over 25 years. I have seen a lot of change in that time – some of it for the better and some . . . well, not so helpful. Below are five developments I noticed this year. Not listed is the sixth and most important change: the increasing interest in learning and sharing knowledge in our community.
December 8, 2015 1:40 PM
Storage choices are expanding almost as fast as is our ability to fill them up. Due to the mission-critical nature of what law firms store, they require reliability, fault tolerance and scalability. However, the price tag to add a few more terabytes of storage to a system can be daunting to some.
Adding additional SAN nodes is the first and, for me, most obvious answer.
Installing new SAN nodes can be added to a storage cluster with no downtime, giving law firms a seamless expansion in storage capacity. This was, after all, one of the reasons you bought SAN storage in the first place, right?
There are other options, though.
November 17, 2015 7:30 AM
Ever struggle with quick-sizing your application windows when comparing or copying information from one program to another? With Windows 7, Microsoft introduced the Aero snap feature. This allows you to take one window and push to a corner and it will “snap” into place taking up half the screen. You can take a second application and snap into the other half. Now, with Windows 10, Microsoft has improved on this functionality and a user can snap four applications instead of the previous two.
October 22, 2015 4:47 PM
At Innovative Computing Systems, we believe in the value of education. We support and urge our staff members to make investments in themselves through additional formal and/or informal education.
That makes our recent partnership with St. Gabriel's Catholic School in Austin all the more special to us. St. Gabriel's is the only independent Junior Kindergarten through 8th grade Catholic School in Austin.
October 7, 2015 5:01 PM
At Innovative Computing Systems, we truly value our partners. We look at their solutions as the “best of breed.” We would like to share both our confidence and their solutions by dedicating a “Partner Series” highlighting their importance to us and law firms. We’ll be holding webinars, posting blogs and case studies and otherwise showing off the expertise of our partners.