<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Darragh Fitzpatrick

Darragh Fitzpatrick

Partner & EVP at Tabush Group

Recent Posts by Darragh Fitzpatrick:

Cybersecurity Tips: If You Get Caught Phishing, Prepare to Catch a Whopper!

Phishing remains one of the most common types of data breaches and often leads to a ransomware attack. When ransomware hits your IT, all or substantial parts of your IT will stop functioning and your data becomes compromised. The only way to bring your systems back online is to restore from backup or to “pay the piper,” the cybercriminal, their ransom. While ransoms of the past were in the thousands, they are now typically hundreds of thousands or even millions! In a worst-case scenario, there will be operating losses due to interruption of services when restoring and rebuilding your systems. The other main results of phishing are the stealing of personal or confidential business information, as well as the hijacking of a person’s mailbox, to deliver false instructions to illicit a payment to the cybercriminal.

What's Netflix Got To Do With IT?

Netflix redefined how we consume media, making it more accessible and readily available. Download our whitepaper to learn what important lessons you should take from Netflix as you consider the future of your firm's IT.

Futureproof Your Firm’s IT with DaaS

2020 changed how we view the workplace.  Moving forward, most firms will no longer be exclusively tied to working in their physical office space.  Based on discussions with colleagues and peers, many firms will downsize (or at least not expand) office space. Instead, flexible work space and flexible schedules will be more typical for most businesses.

As Published in ABA’s Law Practice Magazine: Effectively Plan Your IT Budget

There is no one-size-fits-all answer for firms allocating resources for IT solutions.

Your Business May Be at Risk of a Ransomware Attack

“The attack starts, innocently enough, with an email. But when someone clicks the link inside, hackers quickly take over.”  Once a cybercriminal is in your network, they start demanding a ransom.  Immediately, questions arise: What exactly is ransomware?  What should we do now?  Why were we targeted?  How could we have prevented this?

Ransomware attacks are on the rise and cybercriminals have increasingly started to target all types of businesses, no matter their size.  Your business is a target and increased discussion about your business’s IT security can help prevent an attack.

Legal Software Platform Attacked

Legal case management software platform, TrialWorks, was hit by a ransomware attack in mid-October.  Some of the company’s customers were unable to access their case management accounts for a couple of days!  This is a reputable company that is widely used, and this attack brought the law firms’ productivity to a halt when they could not access client data, case notes, communications, billing, and more.

While it’s unknown exactly what malware infected the software, experts are presuming that the firm paid the ransomware to obtain the decryption keys and restore files.  Within days, TrialWorks announced that it hired several cybersecurity firms to investigate the incident and help restore normal operations.

Your Law Firm is Evolving. So Should Your IT.

The business of owning and running a law firm constantly evolves, but has seen vast change, particularly over the last few years.

Answering Cloud Concerns at Your Law Firm

Moving to the cloud is a big decision for any company. Nearly everyone knows what the cloud is, yet there is still a lot of confusion and uncertainty about when, how, and why a company should move their IT to the cloud. If you are a proponent of cloud but have to overcome concerns in your firm about the cloud, how do you address it?  Here, I discuss ways to overcome some common misconceptions.

If a Breach is Inevitable, Response is Key

There are only two types of companies: Those that have been hacked and those that will be hacked.”  --Robert Mueller, former Director of the FBI

If cyber breaches are an inevitable cost of doing business, how a company responds to a breach is of extreme importance. It has recently been revealed that 57 million Uber users and drivers had personal information exposed in late 2016 and that the hackers were paid $100,000 to keep it quiet.  If all stories are true, the biggest issue with the Uber breach may not be the breach itself, but the lack of engagement, management, and delivery of the response.