Endpoint

11/8/2017
10:30 AM
Tom Cross
Tom Cross
Commentary
50%
50%

How Law Firms Can Make Information Security a Higher Priority

Lawyers always have been responsible for protecting their clients' information, but that was a lot easier to do when everything was on paper. Here are four best practices to follow.

Some people think that law firms aren't interesting targets for computer criminals. They don't typically have terabytes of credit cards and bank accounts on file. But they do retain powerful clients, from wealthy individuals to big companies, and they often have privileged information about those clients, including details of business dealings and inside information about their negotiating positions and future plans.

Of course, law firms have always had an ethical responsibility to protect the confidentiality of their clients. This was a bit easier to do when everything was on paper; the only risk was if the attorney left a sensitive memo in a bar or if the firm didn't have tight physical security to prevent a thief from gaining entry to the office — think Watergate. Clearly, things have changed, but like many other sectors, the adoption of new technology by law firms has outpaced the adoption of the security best practices needed to live with that technology safely.

There are now several prominent examples of how things can go wrong. Earlier this year, global law firm DLA Piper was hit by a strain of ransomware that forced management to shut down its offices for several days while IT dealt with the problem. In 2016, a breach referred to as the Panama Papers entailed a massive document disclosure of 2.6 terabytes of data from Panamanian-based law firm Mossack Fonseca. German newspaper Süddeutsche Zeitung got hold of the documents, resulting in coverage of celebrities' and politicians' financial transactions and other personal details. 

If events like these have a silver lining, it is the possibility that other firms might learn from them in hopes of avoiding the same fate. Here are four best practices law firms should consider as they seek to make information security a higher priority:

1. Prioritize information security in the right way. Unfortunately, when firms get serious about information security, they often do so by designating a person responsible for preventing breaches from occurring. While having a professional CISO is an important step that many firms ought to take, they should do so with a broader understanding of what that person is responsible for.

Breaches are going to occur. The CISO is not just responsible for reducing the risk that they'll happen, but also leading the organization to adopt practices that will limit their impact and setting the organization up to respond properly and recover quickly when they do happen. And incidentally, CISO's are most effective when the rest of the organization understands the importance of good security practices and is open to improving those practices rather than resisting them.

2. Reduce the firm's information footprint. Through our day-to-day use of digital technology we tend to amass piles of valuable data, without even thinking about it. What will computer criminals be able to get access to if they compromise the computer or email account of a typical member of your firm? There may be a lot of old data, documents, and emails sitting on the laptops of your attorneys or on file servers that just don't need to be there. Can you automatically archive old data to offline storage, where it isn't readily available on the network?

3. Involve your employees as a part of the solution. When it comes to reducing the firm's information footprint, a bit of personal awareness on the part of individual employees can go a long way. Tagging an email as "attorney client privileged" won't stop computer criminals from reading it. They should constantly ask themselves, "Is this conversation with a client an appropriate conversation to have via email, where it might be permanently stored or exposed, or should I pick up the phone?"

Employees are also your front lines for detecting things such as phishing attacks. Some people aren't very responsive to training, but others will learn, and report suspicious things they see. Often, sophisticated attacks will target multiple employees. The ones who are good at identifying them may be your first warning.

4. Build an organization that is resilient. Again, breaches are going to happen. The sensible approach is to put together a thorough incident response and recovery strategy. The advent of ransomware makes an especially powerful case for this: if your firm has been backing up all its files and systems daily or even continually, there's no need to pay tens of thousands of dollars to the criminals hijacking your firm's files.

Maintaining a highly secure and safe operation should be top of mind for partners and directors at law firms of all sizes. This is not a routine IT administration task but a smart business strategy that can keep your firm thriving and in good stead with clients for many years to come.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry's most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Tom Cross is a highly experienced and respected information security leader who oversees all technical elements of OPAQ Networks and is responsible for communicating the technology strategy to partners, employees, and investors. He is the co-founder and former CTO of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Olaf Barheine
50%
50%
Olaf Barheine,
User Rank: Apprentice
11/9/2017 | 2:43:01 AM
And please!
Do not carry your client data around on notebook computers or external hard disks in unencrypted form. Notebooks get stolen, hard drives get lost. The same applies to doctors I know and their patient records.
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.