<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Darragh Fitzpatrick

Darragh Fitzpatrick

Partner & EVP at Tabush Group

Recent Posts by Darragh Fitzpatrick:

What's Netflix Got To Do With IT?

Netflix redefined how we consume media, making it more accessible and readily available. Download our whitepaper to learn what important lessons you should take from Netflix as you consider the future of your firm's IT.

Topics: Cloud Technology Insights Boxtop

Futureproof Your Firm’s IT with DaaS

2020 changed how we view the workplace.  Moving forward, most firms will no longer be exclusively tied to working in their physical office space.  Based on discussions with colleagues and peers, many firms will downsize (or at least not expand) office space. Instead, flexible work space and flexible schedules will be more typical for most businesses.

Topics: Cloud Small Law Firms Boxtop Law Firm IT Desktop as a Service (DaaS) Cloud for Law Firms

As Published in ABA’s Law Practice Magazine: Effectively Plan Your IT Budget

There is no one-size-fits-all answer for firms allocating resources for IT solutions.

Topics: Cloud IT Security Cybersecurity

Your Business May Be at Risk of a Ransomware Attack

“The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over.”  Once a cybercriminal is in your network, they start demanding a ransom.  Immediately, questions arise: What exactly is ransomware?  What should we do now?  Why were we targeted?  How could we have prevented this?

Ransomware attacks are on the rise and cybercriminals have increasingly started to target all types of businesses, no matter their size.  Your business is a target and increased discussion about your business’s IT security can help prevent an attack.

Legal Software Platform Attacked

Legal case management software platform, TrialWorks, was hit by a ransomware attack in mid-October.  Some of the company’s customers were unable to access their case management accounts for a couple of days!  This is a reputable company that is widely used, and this attack brought the law firms’ productivity to a halt when they could not access client data, case notes, communications, billing, and more.

While it’s unknown exactly what malware infected the software, experts are presuming that the firm paid the ransomware to obtain the decryption keys and restore files.  Within days, TrialWorks announced that it hired several cybersecurity firms to investigate the incident and help restore normal operations.

Your Law Firm is Evolving. So Should Your IT.

The business of owning and running a law firm constantly evolves, but has seen vast change, particularly over the last few years.

Topics: Data Backups Cybersecurity Law Firm IT Cloud for Business Cloud for Law Firms

Answering Cloud Concerns at Your Law Firm

Moving to the cloud is a big decision for any company. Nearly everyone knows what the cloud is, yet there is still a lot of confusion and uncertainty about when, how, and why a company should move their IT to the cloud. If you are a proponent of cloud but have to overcome concerns in your firm about the cloud, how do you address it?  Here, I discuss ways to overcome some common misconceptions.

Topics: Cloud Cloud for Business Cloud for Law Firms

If a Breach is Inevitable, Response is Key

There are only two types of companies: Those that have been hacked and those that will be hacked.”  --Robert Mueller, former Director of the FBI

If cyber breaches are an inevitable cost of doing business, how a company responds to a breach is of extreme importance. It has recently been revealed that 57 million Uber users and drivers had personal information exposed in late 2016 and that the hackers were paid $100,000 to keep it quiet.  If all stories are true, the biggest issue with the Uber breach may not be the breach itself, but the lack of engagement, management, and delivery of the response. 

Topics: Cybersecurity Cyber Attacks Breach