Keno Kozie BLOG


Protecting Your Organization from Cyberattacks

Embedded email trackers provide a wealth of real-time information to potential cyberattackers. In fact, 95% of all successful cyberattacks start with email. From a company standpoint, as many as 70% of all inbound emails have trackers, and this is where…

The Importance of Document Management Systems for Data Management and Governance

Ensuring effective management of your most important asset Data is your company’s most important asset. Having the wrong document management system (DMS) in place can wreak havoc on an organization, while having the right one will not only save your…

The Importance of Training in Law Firms and Legal Departments

Security and risk awareness training is a requirement for lawyers and their teams to ensure the safety of the firm’s data as well as their clients’.

How to Upgrade Firmware for Citrix NetScaler ADCs

Overview: For the third time in 2020 Citrix has released firmware updates to address Critical security vulnerabilities within NetScaler appliances. The latest is detailed in Citrix article CTX2281474 (previous vulnerabilities include CTX276688 and CTX267027). Due to the frequency of these…

Managed Services – Not a One-Size-Fits-All Program

Managed services is not a one-size-fits-all program. There are many components to your IT infrastructure, and you need to make sure you have the right partner that you can trust. Unfortunately, too many MSPs build their services on the assumption…

What Will the New Normal Look Like?

As states and localities begin to open, predictions are coming out as to what the new normal will look like. Some folks have stated that the future will not look like the past, companies will continue to enable users to…

The 5 Most Common Tech Challenges in the New Remote-Work Normal

The abrupt shift to remote work has been a struggle for many. Having to master new technology and workflows to successfully work from home has meant plenty of frustration — and more than a few calls to tech support. A…

Find an Easier Path to Cybersecurity with Microsoft 365 Business

Ensuring that your business is protected against a cyberattack is a daunting task for any organization. Failing to protect your business, however, can result in tremendous losses and risk for your organization. The average cost of a single small business…

Now More Than Ever – Work with an Expert You Can Trust

Law firms require a tremendous amount of technology to operate efficiently, especially when staff is working remotely. Firms of all sizes leverage tools from various providers and must implement them with function and security in mind. From tool selection to…

Working in the age of COVID-19

I have noticed something of interest, to me anyway. As most of us have moved to working from home, in combination with school closures, the work experience has become far more casual. We hear and often see participants’ children and…

Security Practices to Safeguard Your Digital Assets

COVID-19 has forced many businesses to quickly accommodate their employees working remotely. Having an employee base working away from established offices creates security vulnerabilities that many may not be prepared to mitigate. “Security” as a concept is generally organized under…

6 Ways Tech Can Help Keep Attorneys Engaged, Even While Remote

With stay-at-home and social-distancing orders becoming more prevalent by the day, it’s clear that not only our personal lives, but our professional lives have been markedly affected. Many law firms have the technology and processes in place to allow their staff…

Creating A Smarter Law Firm

Learn More