Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/8/2017
10:30 AM
Tom Cross
Tom Cross
Commentary
100%
0%

How Law Firms Can Make Information Security a Higher Priority

Lawyers always have been responsible for protecting their clients' information, but that was a lot easier to do when everything was on paper. Here are four best practices to follow.

Some people think that law firms aren't interesting targets for computer criminals. They don't typically have terabytes of credit cards and bank accounts on file. But they do retain powerful clients, from wealthy individuals to big companies, and they often have privileged information about those clients, including details of business dealings and inside information about their negotiating positions and future plans.

Of course, law firms have always had an ethical responsibility to protect the confidentiality of their clients. This was a bit easier to do when everything was on paper; the only risk was if the attorney left a sensitive memo in a bar or if the firm didn't have tight physical security to prevent a thief from gaining entry to the office — think Watergate. Clearly, things have changed, but like many other sectors, the adoption of new technology by law firms has outpaced the adoption of the security best practices needed to live with that technology safely.

There are now several prominent examples of how things can go wrong. Earlier this year, global law firm DLA Piper was hit by a strain of ransomware that forced management to shut down its offices for several days while IT dealt with the problem. In 2016, a breach referred to as the Panama Papers entailed a massive document disclosure of 2.6 terabytes of data from Panamanian-based law firm Mossack Fonseca. German newspaper Süddeutsche Zeitung got hold of the documents, resulting in coverage of celebrities' and politicians' financial transactions and other personal details. 

If events like these have a silver lining, it is the possibility that other firms might learn from them in hopes of avoiding the same fate. Here are four best practices law firms should consider as they seek to make information security a higher priority:

1. Prioritize information security in the right way. Unfortunately, when firms get serious about information security, they often do so by designating a person responsible for preventing breaches from occurring. While having a professional CISO is an important step that many firms ought to take, they should do so with a broader understanding of what that person is responsible for.

Breaches are going to occur. The CISO is not just responsible for reducing the risk that they'll happen, but also leading the organization to adopt practices that will limit their impact and setting the organization up to respond properly and recover quickly when they do happen. And incidentally, CISO's are most effective when the rest of the organization understands the importance of good security practices and is open to improving those practices rather than resisting them.

2. Reduce the firm's information footprint. Through our day-to-day use of digital technology we tend to amass piles of valuable data, without even thinking about it. What will computer criminals be able to get access to if they compromise the computer or email account of a typical member of your firm? There may be a lot of old data, documents, and emails sitting on the laptops of your attorneys or on file servers that just don't need to be there. Can you automatically archive old data to offline storage, where it isn't readily available on the network?

3. Involve your employees as a part of the solution. When it comes to reducing the firm's information footprint, a bit of personal awareness on the part of individual employees can go a long way. Tagging an email as "attorney client privileged" won't stop computer criminals from reading it. They should constantly ask themselves, "Is this conversation with a client an appropriate conversation to have via email, where it might be permanently stored or exposed, or should I pick up the phone?"

Employees are also your front lines for detecting things such as phishing attacks. Some people aren't very responsive to training, but others will learn, and report suspicious things they see. Often, sophisticated attacks will target multiple employees. The ones who are good at identifying them may be your first warning.

4. Build an organization that is resilient. Again, breaches are going to happen. The sensible approach is to put together a thorough incident response and recovery strategy. The advent of ransomware makes an especially powerful case for this: if your firm has been backing up all its files and systems daily or even continually, there's no need to pay tens of thousands of dollars to the criminals hijacking your firm's files.

Maintaining a highly secure and safe operation should be top of mind for partners and directors at law firms of all sizes. This is not a routine IT administration task but a smart business strategy that can keep your firm thriving and in good stead with clients for many years to come.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry's most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Tom Cross is a highly experienced and respected information security leader who oversees all technical elements of OPAQ Networks and is responsible for communicating the technology strategy to partners, employees, and investors. He is the co-founder and former CTO of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Olaf Barheine
50%
50%
Olaf Barheine,
User Rank: Apprentice
11/9/2017 | 2:43:01 AM
And please!
Do not carry your client data around on notebook computers or external hard disks in unencrypted form. Notebooks get stolen, hard drives get lost. The same applies to doctors I know and their patient records.
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...