Blog

CRA

Recent Posts

Why Are SMBs Targets For Hackers?

By CRA | November 08, 2017
Small to medium-sized businesses, or SMBs, are at the most risk for hacks. If your business has fewer than 1000 employees, there’s a good chance that you’re at risk. Let’s explore why and how hackers target SMBs and how to tighten up your enterprise to avoid a breach. What Makes SMBs At Risk For Hacking One of the main reasons small to medium businesses are at risk for hacking is a lack of...

4 Ways To Protect Your IoT Devices

By CRA | November 02, 2017
Ten years ago the first iPhone hit the market and our lives changed. Sure, there were BlackBerry and Treo phones before then that hinted at the capabilities of internet-capable phones but it was the iPhone that opened us to all the possibilities. The most incredible of those possibilities? The Internet of Things: the network of devices that can communicate with each other. The IoT includes cars,...

How Law Firms Harness The Power of Social Media To Gain Clients

By CRA | September 19, 2017
Social media isn’t just for brands. People go to social for news, recommendations and to educate themselves. If your law firm is using traditional advertising, it’s time to reconsider. Here’s how social can help your firm gain clients. Social Media Works For Law Firms Despite the fact that social media works, few law firms have leveraged its power. Here’s why social works and an easy way to build...

Is Your Law Firm Compliant With The 2017 ABA Email Guidelines?

By CRA | September 12, 2017
For an attorney email security is vital to both your reputation and your career. The American Bar Association Standing Committee on Ethics and Professional Responsibility has updated its stance on electronic communication. Here’s what you need to know. Attorney Email Expectations Historically, it has taken time for professional organizations to catch up with technology. Recent worldwide attention...

How to Improve Law Firm Digital Defenses

By CRA | September 06, 2017
Cyberattacks have been on the rise across all industries in recent years. Because law is not thought of as a technology-driven industry, security is often overlooked. In fact, a 2017 study revealed that two-thirds of law firms surveyed had some sort of security breach. On top of that, 77% didn’t have cyber insurance and 53% didn’t have a security breach response plan. Law firms are tempting...

Empowering Attorneys in the Field with Secure File Access

By CRA | August 30, 2017
Even the simplest legal matters require substantial paperwork. Many individuals require access to files during case processing, too. Paralegals, administrative assistants, clerks and other attorneys regularly review and consult documents on behalf of clients. PDFs and other digital formats have simplified life for lawyers, since documents are instantly searchable and shareable. Cloud computing...

Is Your Business Prepared for a Cyberattack?

By CRA | July 18, 2017
Businesses across all industries are vulnerable to cyberattacks. The threat is particularly great for small and mid-sized businesses that can’t divert resources into full-time, in-house IT security teams. The good news is that managed service providers (MSPs) help overcome these security obstacles. Outsourcing means you’ll have top of the line security solutions for whatever issues arise. A...

Leveraging the Cloud for Security

By CRA | July 11, 2017
There are numerous advantages to shifting your business environment to the cloud. Cloud computing offers cost-effective solutions that increase mobility, maximize scalability and promote collaboration. But what about cloud computing security? Despite concerns that increased accessibility might lead to data vulnerability, cloud computing is on the rise. A recent survey on the state of the cloud...

How to Identify Spam and Safe from Spoofing, Phishing and Pharming

By CRA | June 27, 2017
In the early days of the internet, the dangers of spam were easy to avoid by following a few simple rules. You could dodge most security risks and identity theft by deleting unsolicited attachments and offers from “Nigerian princes.” Then, spam-recognition algorithms became advanced enough to rid us of most of the chaff in our inboxes. All the while, spammers and identity thieves developed more...

IT Security Best Practices: Saving, Sending & Sharing Files

By CRA | June 20, 2017
Information technology has become a vital part of everyday life and business. The barrier to entry is lower than it’s ever been and there are numerous free technology solutions available for saving files, sharing files, and sending files. Many offer flexibility and accessibility, but it’s also critical to ensure your files are secure. Here we describe strategies and IT security best practices for...

The Benefits of Outsourcing Your Nonprofit Organization’s IT Operations to CRA

By CRA | May 30, 2017
CRA Provides Exceptional IT Solutions for Nonprofit Organizations More nonprofit organizations are becoming savvy to the benefits of outsourcing IT operations. When budgets are tight, it may seem counterintuitive to spend money on managed IT and consulting services. In truth, such solutions can help streamline your budget and maximize your current funds. Taking advantage of all that modern IT...

Social Media for Nonprofits - Best Use Cases

By CRA | May 11, 2017
How Nonprofit Organizations Can Harness the Power of Social Media A recent study by the Case Foundation and Social Media for Nonprofits examined trends among almost 500 organizations to understand how they use social media. Even though 97% of these organizations were on Facebook, 88% cited email and their website as their most important communication tools. This seemed to be because nearly half...