SlideShare a Scribd company logo
1 of 15
Download to read offline
How to Prevent Your Client’s Data from Getting Hacked
on February 26th, 2014

Andy Wilson
Co-founder of Logikcull.com
andy@logikcull.com
@iDedupe
C

C

C

C

C

As cyber-criminals continue to seek new opportunities for their
break-ins, law firms constitute low-hanging fruit.
Digital espionage is estimated to cost American companies over $50 billion per year, according
to Harvard Journal of Law & Technology , and 10% of the advanced cyberattacks were targeted
at law firms. A recent study published by the American Bar Association estimates the average
data breach to cost $7.2 million, with an averaged cost of $214 per client record.
And you thought
eDiscovery was expensive!

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

Why is a law practice particularly tempting?

How to Prevent Your Client’s Data from Getting Hacked

C

C
C

C
1-2-3

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

1. Concentration of sensitive documents
1

Large law firms tend to hold significant accumulations of private financial information,
including due diligence materials, negotiation strategies, specific details on technological
secrets, and many other critical items. In a globalized corporate environment, such
materials as these can be worth millions of dollars to foreign intelligence interests.

2. Law firms have notoriously poor data security
3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C
2

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
Lucy Thompson, Chair of the ABA, points out that information released to law firms often
enters an unguarded arena: “Its possible the information comes from a very secure source,
a company with very good security. Then it goes to a law firm, and who knows what kind of
security they are going to have.”

3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C
3

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
3. Information is pre-sorted for value
Large companies accumulate vast quantities of documents, most of which have no
usefulness to cybercriminals and corporate spies. A company’s outside counsel, however,
will only possess materials with the greatest sensitivity and value, so the interested hacker
doesn’t have to sift through mountains of unrelated material.

How to Prevent Your Client’s Data from Getting Hacked

You guys know ALL
about this, eh?

C
C

C

C

C

C

So what can a law firm do to better protect client data?

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

1. Minimize data storage locations
Each data storage location increases your overall exposure to possible compromise, and
multiplies the effort you have to expend to keep data secure. Minimizing the number of
storage locations and devices will simplify your data security program and decrease the
chances of overlooking a vulnerability. Storing all sensitive data at a central cloud location
with strong access controls and monitoring is usually the best choice.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

2. Encrypt your “data at rest”
“Data at rest” is an IT term that simply refers to inactive stored information. There are two
approaches to keeping inactive data safe from hacking: Access controls and data
encryption. Encryption is a way of scrambling information according to a certain pattern, so
that only the users who have access to that pattern (or “key”) can unscramble it and make
it readable. Encryption technology is an excellent way to prevent data theft, since even if
the database is hacked, the thieves wont be able to actually use the material they steal.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

3. Protect data in transit
When data is in transit, it can be subject to eavesdropping or tampering at various points
in its journey. Prior to transferring any customer data, ensure that the site domain name
matches what you expect, and that the URL shows “https” instead of just “http”. Email
should not be considered a secure transport channel unless steps are taken to encrypt the
message before sending it. By default, all emails, particularly those which travel outside of
your own domain, are unencrypted and are subject to eavesdropping and theft.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

4. Secure your devices
The final piece in a program of keeping client data safe is to make sure that devices
themselves are safe. The Journal of the American Bar Association highlights a survey
showing that 36% of lawyers who use smartphones have lost them at some point, and
46% of those lost phones were not even protected by a password of any kind.

How to Prevent Your Client’s Data from Getting Hacked

C

C
C

C
(

(

(

C

C
(

(

C

(

(

Summary
Following the outlined principles will help ensure that your law offices client
data is only stored in absolutely necessary locations, is protected with access
controls and encryption, is transmitted securely, and resides on safe, malwarefree devices. Enacting a cloud-based security program will give your clients
confidence in the professionalism and discretion of your practice, and will
comply with American Bar Association standards for taking reasonable,
competent measures to protect client information.

How to Prevent Your Client’s Data from Getting Hacked

(

C
(
C

C
(

(

(

C

C
(

(

C

(

(

(

C

Download the complete
white paper at:

http://logikcull.com/white-papers

How to Prevent Your Client’s Data from Getting Hacked

(
C

C
(

(

(

C

C
(

(

C

(

About Logikcull.com
Logik is the creator of www.logikcull.com ­ the leading cloud­based eDiscovery platform.
Logikcull is ideal for corporations and law firms that want an easy­to­use, affordable, and
secure eDiscovery platform without needing to invest in significant hardware and software
costs. Logikcull can be accessed using PCs and Macs as well as mobile devices including
the iPhone and iPad.
To keep customer data secure, Logikcull.com resides behind an enterprise SSAE16 SOC­1
Type II certified data center. For added security and customer comfort, Logikcull is not
hosted in a public cloud like Amazon Web Services (AWS). Some use cases for Logikcull are:
eDiscovery & document review, information governance, document archiving, document
collaboration, deal rooms, matter mobility, and internal investigations.
Logik is headquartered in Washington, DC and was founded by Andy Wilson and Sheng
Yang in 2004. Visit www.logikcull.com, email questions@logikcull.com, call 1­800­951­
5507 or follow us on Twitter @logikcull.
Learn more at: http://logikcull.com

How to Prevent Your Client’s Data from Getting Hacked

(

(

C
(

More Related Content

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

How to Prevent Your Client’s Data from Getting Hacked

  • 1. How to Prevent Your Client’s Data from Getting Hacked on February 26th, 2014 Andy Wilson Co-founder of Logikcull.com andy@logikcull.com @iDedupe
  • 2. C C C C C As cyber-criminals continue to seek new opportunities for their break-ins, law firms constitute low-hanging fruit. Digital espionage is estimated to cost American companies over $50 billion per year, according to Harvard Journal of Law & Technology , and 10% of the advanced cyberattacks were targeted at law firms. A recent study published by the American Bar Association estimates the average data breach to cost $7.2 million, with an averaged cost of $214 per client record. And you thought eDiscovery was expensive! How to Prevent Your Client’s Data from Getting Hacked C
  • 3. C C C C Why is a law practice particularly tempting? How to Prevent Your Client’s Data from Getting Hacked C C
  • 4. C C 1-2-3 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 5. C C C C C 1. Concentration of sensitive documents 1 Large law firms tend to hold significant accumulations of private financial information, including due diligence materials, negotiation strategies, specific details on technological secrets, and many other critical items. In a globalized corporate environment, such materials as these can be worth millions of dollars to foreign intelligence interests. 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 6. C C 2 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security Lucy Thompson, Chair of the ABA, points out that information released to law firms often enters an unguarded arena: “Its possible the information comes from a very secure source, a company with very good security. Then it goes to a law firm, and who knows what kind of security they are going to have.” 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 7. C C 3 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value Large companies accumulate vast quantities of documents, most of which have no usefulness to cybercriminals and corporate spies. A company’s outside counsel, however, will only possess materials with the greatest sensitivity and value, so the interested hacker doesn’t have to sift through mountains of unrelated material. How to Prevent Your Client’s Data from Getting Hacked You guys know ALL about this, eh? C
  • 8. C C C C C So what can a law firm do to better protect client data? How to Prevent Your Client’s Data from Getting Hacked C
  • 9. C C C C C 1. Minimize data storage locations Each data storage location increases your overall exposure to possible compromise, and multiplies the effort you have to expend to keep data secure. Minimizing the number of storage locations and devices will simplify your data security program and decrease the chances of overlooking a vulnerability. Storing all sensitive data at a central cloud location with strong access controls and monitoring is usually the best choice. How to Prevent Your Client’s Data from Getting Hacked C
  • 10. C C C C C 2. Encrypt your “data at rest” “Data at rest” is an IT term that simply refers to inactive stored information. There are two approaches to keeping inactive data safe from hacking: Access controls and data encryption. Encryption is a way of scrambling information according to a certain pattern, so that only the users who have access to that pattern (or “key”) can unscramble it and make it readable. Encryption technology is an excellent way to prevent data theft, since even if the database is hacked, the thieves wont be able to actually use the material they steal. How to Prevent Your Client’s Data from Getting Hacked C
  • 11. C C C C C 3. Protect data in transit When data is in transit, it can be subject to eavesdropping or tampering at various points in its journey. Prior to transferring any customer data, ensure that the site domain name matches what you expect, and that the URL shows “https” instead of just “http”. Email should not be considered a secure transport channel unless steps are taken to encrypt the message before sending it. By default, all emails, particularly those which travel outside of your own domain, are unencrypted and are subject to eavesdropping and theft. How to Prevent Your Client’s Data from Getting Hacked C
  • 12. C C C C 4. Secure your devices The final piece in a program of keeping client data safe is to make sure that devices themselves are safe. The Journal of the American Bar Association highlights a survey showing that 36% of lawyers who use smartphones have lost them at some point, and 46% of those lost phones were not even protected by a password of any kind. How to Prevent Your Client’s Data from Getting Hacked C C
  • 13. C C ( ( ( C C ( ( C ( ( Summary Following the outlined principles will help ensure that your law offices client data is only stored in absolutely necessary locations, is protected with access controls and encryption, is transmitted securely, and resides on safe, malwarefree devices. Enacting a cloud-based security program will give your clients confidence in the professionalism and discretion of your practice, and will comply with American Bar Association standards for taking reasonable, competent measures to protect client information. How to Prevent Your Client’s Data from Getting Hacked ( C (
  • 14. C C ( ( ( C C ( ( C ( ( ( C Download the complete white paper at: http://logikcull.com/white-papers How to Prevent Your Client’s Data from Getting Hacked (
  • 15. C C ( ( ( C C ( ( C ( About Logikcull.com Logik is the creator of www.logikcull.com ­ the leading cloud­based eDiscovery platform. Logikcull is ideal for corporations and law firms that want an easy­to­use, affordable, and secure eDiscovery platform without needing to invest in significant hardware and software costs. Logikcull can be accessed using PCs and Macs as well as mobile devices including the iPhone and iPad. To keep customer data secure, Logikcull.com resides behind an enterprise SSAE16 SOC­1 Type II certified data center. For added security and customer comfort, Logikcull is not hosted in a public cloud like Amazon Web Services (AWS). Some use cases for Logikcull are: eDiscovery & document review, information governance, document archiving, document collaboration, deal rooms, matter mobility, and internal investigations. Logik is headquartered in Washington, DC and was founded by Andy Wilson and Sheng Yang in 2004. Visit www.logikcull.com, email questions@logikcull.com, call 1­800­951­ 5507 or follow us on Twitter @logikcull. Learn more at: http://logikcull.com How to Prevent Your Client’s Data from Getting Hacked ( ( C (