In March of 2021, a highly sophisticated cyber attack on Microsoft’s business email software created a world-wide security crisis. More than 60,000 victims of the hack have been reported globally, including many small to mid-sized businesses who were susceptible to the security breach. Microsoft explains that the hack exposed and capitalized on vulnerabilities in their Exchange Server mail and calendar software. Because the hackers specifically targeted long-standing weaknesses in the ... More Info
THE VERDICT: IT’S TIME TO UPDATE YOUR FIRM’S TECHNOLOGY
Confidential client information, teams of remote attorneys, virtual hearings, and shared access to files from a variety of locations: technology plays a big role in helping law firms around the country operate smoothly, efficiently, and safely as cases are tried online and employees work from home. Your firm’s IT may have been top-notch for on-site activity at one point, but in 2021, it’s time to re-evaluate your technology to maximize opportunities during remote operations. Three ... More Info
LOOK LIKE AN EXPERT: THE INS AND OUTS OF MANAGED IT SERVICES
IT solutions for your business can sound intimidating, but you don’t have to be an expert in technology to run your business like a tech guru. Small- and medium-sized businesses have two main options when considering their needs around IT services: Hire and train staff to maintain your individual business needs Outsource IT services and allow the experts to manage it If you don’t have personal or in-house expertise in technology, security, data storage and servers, ... More Info
THE WOMEN WHO GOT US HERE
This month, we celebrate Women’s History Month, which honors the important contributions of women throughout the ages, and International Women’s Day, which recognizes the rich social, economical, political, and cultural influences of women. Our business and our world wouldn’t be where they are today without the incredible advances women have made in the technology sphere. There have been many women who have made immensely important contributions to technology. Here are five you ... More Info
AVOID THE BAIT AS PHISHING GROWS
Phishing scams have become more invasive and intelligent since the days of foreign princes reaching out to confirm your bank account numbers and collect your newly found inheritance. Many of us already know to avoid pop-up ads and not to click the links in suspicious emails. Today, however, social engineering is often used to acquire login credentials and credit card information. Phishing can occur through text, instant messages across social platforms, and email, even email messages ... More Info