27 Jul

Microsoft KB breaks WSUS (SCCM Software Update Point)

Back in May, Microsoft released KB3159706 to resolve an issue with a previous KB that broke WSUS.  Unfortunately, KB3159706 also breaks WSUS. You can prevent this by performing some manual steps after it is installed. We have repeatedly seen WSUS service crashes labeled Event 7031 with the error “The WSUS Service service terminated unexpectedly.  It has Read more…

07 Jun

Bug Alert: Microsoft Exchange Server 2013, 2016, and Exchange Online

Microsoft has issued KB3161916, detailing a bug affecting migrations from legacy public folders to modern public folders on Exchange 2013, Exchange 2016, or Exchange Online.  The issue is serious enough that, if you meet the criteria, you should stop any public folder migrations until a fix is released. The normal procedure to migrate public folders involves connecting Read more…

17 Mar

Citrix License Server Vulnerability

Citrix recently identified a vulnerability in License Server versions prior to 11.13.1.2 (released 2/17/16) that could allow a remote, unauthenticated attacker to crash the License Server and potentially execute arbitrary code, though the attacker would likely need to be on the local network since License Server is typically not directly exposed to the Internet. That Read more…

21 Sep

Block These 2 Microsoft Patches to Prevent an Awful Bug

Recently, a couple of our support clients have reported issues with Microsoft Outlook 2010: Email attachments are lost or missing from sent emails, and content from one attachment is duplicated in another. We’ve also seen content from two attachments switch places with one another. Just imagine the unintended consequences of this when sending multiple finalized contracts Read more…

25 Feb

The Cybersecurity Executive Order and Law Firms

On February 12, 2013, President Obama signed an Executive Order titled “Improving Critical Infrastructure Cybersecurity.” The order calls for heightened measures in the private sector to ensure the country’s security in the face of cyber-threats. The release mandates increased visibility and communication between government agencies and private companies that hold highly sensitive data. The order Read more…

29 Feb

Hackers continue to get creative

Hackers are always pushing the envelope as software, systems and people become better at protection against them.  Social engineering techniques evolve in an attempt to penetrate the most secured mechanisms and the most skeptical of users. Trusteer is reporting on a new technique specifically targeting business and commercial banking customers.  To summarize, computers infected with Read more…

27 Jan

Leveraging SharePoint 2010 and Microsoft Office to Expedite Proposal Development

Join Kraft Kennedy’s Rich Westle for an ILTA webinar entitled “Leveraging SharePoint 2010 and Microsoft Office to Expedite Proposal Development”. When:Friday, February 10, 2012 Time:12:00 – 1:00 Eastern Register: Click Here to Register ANSOR Legal Marketing and Experience Suite helps law firms of all sizes maximize their Microsoft investment while accelerating the proposal development process. Read more…

25 Jan

Exchange 2010 Ecosystem

Join Kraft Kennedy’s Joe Hoegler for an ILTA Webinar entitled “Exchange 2010 Ecosystem”. The webinar will focus on the native features of Microsoft Exchange 2010, including high availability, disaster recovery, antivirus and antispam functionality, unified messaging and more. You’ll also hear guidelines and tips on integrating Exchange with SharePoint 2010, Office 2010 and Lync Server Read more…

19 Jan

Leveraging SharePoint 2010 and Microsoft Office to Expedite Proposal Development

Join Kraft Kennedy’s Management Consultant Rich Westle and Duane Morris’ Marketing Manager Cheryl Disch for a panel dicussion entitled “Leveraging SharePoint 2010 and Microsoft Office to Expedite Proposal Development” during the Microsoft Super Session at LegalTech New York 2012. Legal Tech New YorkNew York Hilton – 2nd Floor – Gibson SuiteWednesday, February 1st10:30am-11:30am Leveraging SharePoint 2010 and Read more…

  1. 1
  2. 2
  3. 3