<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Matthew Futter

Recent Posts by Matthew Futter:

Managed IT for Law Firms: 4 Advantages vs Hiring an In-House IT Professional

Cybersecurity attacks continue to rise, and law firms of all sizes have become a prime target. According to Coveware, 24.9% of all ransomware attacks in Q1 2021 targeted professional services firms, especially small and midsize law firms. With the surge in cyberattacks, firms have begun to shift how their IT is managed, with an increase in the use of managed IT services versus in-house IT professionals.

Topics: IT Cybersecurity IT Best Practices Productivity cyberattack

Three Cybersecurity Best Practices for Your Firm

Proper education can help in preventing any of the cybersecurity attacks described in the 411 on Cybersecurity and Your Firm. While it is true that your IT department plays a vital role in ensuring your firm follows cybersecurity best practices, that does not mean they alone are responsible for your firm’s security. Awareness of and participation in cybersecurity best practices need to become part of your firm’s culture for every single person. Here are three things you can do.

Topics: IT Cybersecurity cyberattack

Three Benefits of Becoming a Tabush Group Channel Partner

A question you may be asking yourself is why should my firm become a Channel Partner with Tabush Group? In today’s marketplace, joining a Channel Partner program can be quite attractive. Here are three benefits of Tabush Group’s Channel Partner program.

Topics: cloud Boxtop Tabush Group Desktop as a Service (DaaS)

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

Topics: IT Cybersecurity cyberattack

What Is Social Engineering and How to Prepare Your Firm

Social engineering is the practice of exploiting human psychology and manipulating people to gain access to systems, data, or a physical location. This term might be newer, but the art of the scam has been around for much longer.

Topics: IT Cybersecurity Social Engineering cyberattack

Podcast: Simplifying and Systematizing Your Remote Workspace

Our very own Darragh Fitzpatrick, Partner & Executive Vice President here at Tabush Group, was recently featured on the Systems Simplified podcast, discussing Simplifying and Systematizing Your Remote Workspace.

Topics: Cybersecurity Law Firm

Cybersecurity Tips: Four Ways to Protect Yourself

Cybersecurity is something that should always be at the top of mind when it comes to your business. Since the COVID-19 pandemic hit, more people are working remotely, and this is a concern for organizations because home or public networks generally do not have the same security protocols and safeguards in place to protect against cyber threats.

Topics: Cybersecurity Law Firm cyberattack

Replay: Tabs3 and Worldox: In the Cloud, without Compromise

In this webinar, our panel discussed how you can have all of the benefits and security of the cloud for everything – your infrastructure, all your applications, and your data.

Topics: cloud IT IT Best Practices Boxtop Law Firm Productivity remote access