SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
1
2016 IT Disaster Recovery Planning and Preparedness Survey
Legal Firms and the Struggle
to Protect Sensitive Data
Table of Contents
Survey Objectives................................................................................................................................. 3
Survey Results................................................................................................................................... 4-10
Conclusion: Making Sense of the Data......................................................................................... 11
Key Insights................................................................................................................................... 12
Leverage IT Security and DR to Minimize Your Firm’s Risk........................................... 13
Why Firms are Turning to DRaaS........................................................................................... 14
Survey Overview
The demands of modernization in law firms have driven intense competition for innovation and service
to customers. But adopting innovations while also remaining secure from internal and external threats
have become a genuine concern.
As a leader in Disaster Recovery-as-a-Service (DRaaS), with expertise in serving law firms, Bluelock
commissioned an online reader survey with ALM (parent company of Legaltech News, Law.com,
The American Lawyer, etc.) to assess the current state of the legal industry’s IT disaster recovery (DR)
preparedness, pressures and confidence. We conducted the survey by asking legal IT professionals
(66 total respondents) in October 2016, to explore the following:
Top three challenges to firms’ operations
Respondents named “data security” (69%),
“budget” (59%) and “overburdened IT teams”
(40%) as their biggest challenges
Confidence in current DR plan Respondents were very or somewhat confident (68%)
DR testing methods
Respondents were unsure of their
testing methods or had no tests (62%)
Increasing pressure from constituents
Respondents claimed increasing pressures
from auditors (51%) and clients (42%)
Survey Results
5
Despite Top Challenges to IT Operations...
Choose the top 3 challenges your firm faces when it comes to successfully managing IT operations.
Data Security
0% 10% 20% 30% 40% 50% 60% 70%
Budget
BYOD & Personal Devices
Big Data
Datacenter Transformation
Regulatory Compliance
Client Demands for Audits & Systems Availability
Overburdened IT Teams
Other
Getting Buy-In from Managing Partners
69%
59%
40%
22%
24%
16%
26%
31%
9%
5%
★
★
★
6
The Majority of IT Pros Have Some Level
of Confidence in Disaster Recovery...
23% “very confident” | 45% “somewhat confident” | 20% “not sure” | 5% “somewhat confident” | 3% “not confident at all” | rest did not respond
Percentage of respondents
that expressed confidence
in their DR plan
68%
How confident are you that your disaster recovery (DR) plan is effective?
7
But Most Aren’t Testing Their DR Plans
32% “not sure” | 16% “we don’t have a DR plan test” | 14% “we don’t have a DR plan”
Please indicate what type(s) of DR testing you are currently using.
62%
Percentage of respondents
who claimed they didn’t test or
didn’t know what tests they did
This means the 68% who claimed
confidence in their DR plans may
be overconfident.
Given their concerns for data security,
this doesn’t bode well. If no DR tests
are being done, then firms are not
proactively identifying their
vulnerabilities. This increases the
potential risk and impact of security
incidents or an IT service disruption.
8
For those law firms conducting IT DR testing, sandbox simulations are most prevalent.
To thoroughly test disaster recovery plans and minimize risk, law firms should be initiating
sandbox simulation tests at least twice a year. When possible, full-scale testing is the most
true-to-life testing method and should be considered.
Test to Minimize Your Risk
Please indicate what type(s) of DR testing you are currently using.
10%
20%
30%
15%
25%
5%
Tabletop Tests
(Teams Review the DR Plan)
Sandbox Simulation
(Technology is Testing in Isolation,
with No Impact to Production)
Full-Scale Testing
(Full Failover and Failback Testing
of Production Environment)
0%
16%
28%
11%
9
IT Departments are Facing Increased
Pressure from Auditors and Regulators
Percentage of respondents
that claimed to face audits
and regulations regarding IT
data protection
51%
23% “strongly agree” | 28% “somewhat agree” | 27% “neither agree nor disagree” | 14% “somewhat disagree” | 8% “strongly disagree”
How strongly do you agree with the following statement: “My organization is facing increasing pressure from IT audits and regulations”?
10
Clients are Putting More Pressure
on IT Departments
42%
Percentage of respondents who claimed
clients are requesting information
about their firms’ IT operations and
data protection policies
Because law firms house large
quantities of sensitive client data,
IT departments are facing increased
scrutiny — especially those whose
law firms provide service to clients
in the banking industry.
11% “strongly agree” | 31% “somewhat agree” | 25% “neither agree nor disagree” | 13% “somewhat disagree” | 20% “strongly disagree”
How strongly do you agree with the following statement:
“More of my clients are requesting information about my firm’s IT operations and data protection policies”?
Conclusion
Making Sense of the Data
Key Insights
Success is Strained When IT Teams Lack Resources
IT professionals at legal firms are expected to be reactive to the needs of their partners.
However, stretched budgets (59%) and overburdened IT staff (40%) make it difficult to
embrace change in an era where it’s critical to mitigate risks. Because downtime can
be hugely detrimental to a firm’s reputation and livelihood, a proactive approach to DR
is essential.
In Cisco’s 2015 Annual Security Report, law firms ranked as the seventh most vulnerable business
sector to cyber attacks. Because legal proceedings often rely on sensitive client information,
hackers see an opportunity for profit and target firms for this data. No wonder 69% of respon-
dents have ranked “data security” as the biggest challenge to their firms’ IT operations.
Data Security is a Top Priority
Confidence Must Be Based On Evidence
Since data is has become a cornerstone of the modern legal practice, it’s no surprise that
regulators are taking more steps to ensure continuity and clients are requesting proof of
resiliency. Yet when 68% percent of respondents express confidence in their DR plans and
simultaneously fail to articulate their testing methods, constituents may see this disconnect as
an inability to survive in the face of crisis. 62% of firms don’t know what DR tests they perform
or have no DR tests at all, which poses a major security risk since vulnerabilities aren’t being
identified. Furthermore, it implies that their confidence in resiliency may be unfounded.
13
Leverage IT Security and DR
to Minimize Your Firm’s Risk
Information Security practices need to have direct ties to IT incident response procedures. Law firms
are increasingly turning to more modern and secure IT disaster recovery solutions to improve their
security and resiliency posture. By leveraging Disaster-Recovery-as-a-Service (DRaaS), firms are
making huge strides from existing backup-based or depreciated infrastructure to overcoming tight
budget and personnel constraints with robust data protection.
Taking steps to improve a DR strategy protects
your law firm’s reputation, client trust and –
ultimately – revenue.
“The reality is if your information
system is taken down for whatever
reason: a flood, malware, hack
attack, etc., you still have a business
continuity and disaster recovery
issue on your hands.”
- Ken Beaver, TechTarget
14
Why Law Firms are Turning to Bluelock
Legal firms are turning to Bluelock because we are dedicated to their security and empowerment.
Our Disaster Recovery-as-a-Service (DRaaS) isn’t just data protection. It’s the seamless delivery of
a digital experience, no matter the technology, so that your firm can tackle your future with certainty.
Serving as an expert extension of your IT team in handling the end-to-end responsibilities of DR
planning, testing and maintenance, Bluelock gives your IT talent the freedom to focus on other,
more pressing objectives that drive direct value to your law firm.
Worried about proof to constituents? Our client portal, Bluelock Portfolio™, offers complete visibility
with recovery metrics for even the most skeptical stakeholders, auditors or clients. Our unique
service program, Recovery Assurance™, offers verifiable evidence of recoverability and security.
For more information about Bluelock, visit bluelock.com/law.
Jumpstart your strategy by visiting our
Practical Guide to DRaaS.
www.bluelock.com | 888.402.2583 | Indianapolis · Las Vegas

Contenu connexe

Tendances

2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Gov BizCouncil
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper Meridian
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportTomas Imrich
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingGov BizCouncil
 
Bringing Federal IT Up to Speed
Bringing Federal IT Up to SpeedBringing Federal IT Up to Speed
Bringing Federal IT Up to SpeedGov BizCouncil
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation ProcessGov BizCouncil
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsJim Kaplan CIA CFE
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
PwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographicPwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographicPwC
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?AGILLY
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureJake Weaver
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 

Tendances (20)

2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
20160210 webinarslides
20160210 webinarslides20160210 webinarslides
20160210 webinarslides
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
 
Bringing Federal IT Up to Speed
Bringing Federal IT Up to SpeedBringing Federal IT Up to Speed
Bringing Federal IT Up to Speed
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
PwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographicPwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographic
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 

Similaire à Legal Firms and the Struggle to Protect Sensitive Data

Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfMichelleTartalio
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...RapidValue
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015 Den Reymer
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsRadhakrishnan Iyer
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation surveyBrunswick Group
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Software
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Market Connections, Inc.
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalClaire Louis
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey aheadKevin Duffey
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudSelas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudZiya NISANOGLU
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...SolarWinds
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSathishKumar960827
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwCACCASG Community Manager
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfFiyona Nourin
 

Similaire à Legal Firms and the Struggle to Protect Sensitive Data (20)

Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue Solutions
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Storyboard colocation strategy
Storyboard colocation strategyStoryboard colocation strategy
Storyboard colocation strategy
 
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudSelas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdf
 

Plus de Bluelock

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramBluelock
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach ConcernsBluelock
 
Bluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR WorkshopBluelock
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%Bluelock
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveBluelock
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryBluelock
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersBluelock
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBluelock
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredBluelock
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudBluelock
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudBluelock
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindBluelock
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 

Plus de Bluelock (14)

How to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery ProgramHow to Establish and Maintain a Disaster Recovery Program
How to Establish and Maintain a Disaster Recovery Program
 
Biggest Security Breach Concerns
Biggest Security Breach ConcernsBiggest Security Breach Concerns
Biggest Security Breach Concerns
 
Bluelock's Recovery Suite
Bluelock's Recovery SuiteBluelock's Recovery Suite
Bluelock's Recovery Suite
 
2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop2014 July Webinar Modern DR Workshop
2014 July Webinar Modern DR Workshop
 
DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%DECA Financial Services Reduces DR Costs by More Than 50%
DECA Financial Services Reduces DR Costs by More Than 50%
 
Recovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep DiveRecovery as a Service Technical Deep Dive
Recovery as a Service Technical Deep Dive
 
How to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster RecoveryHow to Budget for Cloud-Based Disaster Recovery
How to Budget for Cloud-Based Disaster Recovery
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other Disasters
 
Benefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a ServiceBenefits and Advantages of Cloud Infrastructure as a Service
Benefits and Advantages of Cloud Infrastructure as a Service
 
Top 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions AnsweredTop 10 Recovery as-a-Service Questions Answered
Top 10 Recovery as-a-Service Questions Answered
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the Cloud
 
How to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the CloudHow to Implement Disaster Recovery in the Cloud
How to Implement Disaster Recovery in the Cloud
 
How to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in MindHow to Plan and Budget for 2013 with Cloud in Mind
How to Plan and Budget for 2013 with Cloud in Mind
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 

Dernier

Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 

Dernier (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

Legal Firms and the Struggle to Protect Sensitive Data

  • 1. 1 2016 IT Disaster Recovery Planning and Preparedness Survey Legal Firms and the Struggle to Protect Sensitive Data
  • 2. Table of Contents Survey Objectives................................................................................................................................. 3 Survey Results................................................................................................................................... 4-10 Conclusion: Making Sense of the Data......................................................................................... 11 Key Insights................................................................................................................................... 12 Leverage IT Security and DR to Minimize Your Firm’s Risk........................................... 13 Why Firms are Turning to DRaaS........................................................................................... 14
  • 3. Survey Overview The demands of modernization in law firms have driven intense competition for innovation and service to customers. But adopting innovations while also remaining secure from internal and external threats have become a genuine concern. As a leader in Disaster Recovery-as-a-Service (DRaaS), with expertise in serving law firms, Bluelock commissioned an online reader survey with ALM (parent company of Legaltech News, Law.com, The American Lawyer, etc.) to assess the current state of the legal industry’s IT disaster recovery (DR) preparedness, pressures and confidence. We conducted the survey by asking legal IT professionals (66 total respondents) in October 2016, to explore the following: Top three challenges to firms’ operations Respondents named “data security” (69%), “budget” (59%) and “overburdened IT teams” (40%) as their biggest challenges Confidence in current DR plan Respondents were very or somewhat confident (68%) DR testing methods Respondents were unsure of their testing methods or had no tests (62%) Increasing pressure from constituents Respondents claimed increasing pressures from auditors (51%) and clients (42%)
  • 5. 5 Despite Top Challenges to IT Operations... Choose the top 3 challenges your firm faces when it comes to successfully managing IT operations. Data Security 0% 10% 20% 30% 40% 50% 60% 70% Budget BYOD & Personal Devices Big Data Datacenter Transformation Regulatory Compliance Client Demands for Audits & Systems Availability Overburdened IT Teams Other Getting Buy-In from Managing Partners 69% 59% 40% 22% 24% 16% 26% 31% 9% 5% ★ ★ ★
  • 6. 6 The Majority of IT Pros Have Some Level of Confidence in Disaster Recovery... 23% “very confident” | 45% “somewhat confident” | 20% “not sure” | 5% “somewhat confident” | 3% “not confident at all” | rest did not respond Percentage of respondents that expressed confidence in their DR plan 68% How confident are you that your disaster recovery (DR) plan is effective?
  • 7. 7 But Most Aren’t Testing Their DR Plans 32% “not sure” | 16% “we don’t have a DR plan test” | 14% “we don’t have a DR plan” Please indicate what type(s) of DR testing you are currently using. 62% Percentage of respondents who claimed they didn’t test or didn’t know what tests they did This means the 68% who claimed confidence in their DR plans may be overconfident. Given their concerns for data security, this doesn’t bode well. If no DR tests are being done, then firms are not proactively identifying their vulnerabilities. This increases the potential risk and impact of security incidents or an IT service disruption.
  • 8. 8 For those law firms conducting IT DR testing, sandbox simulations are most prevalent. To thoroughly test disaster recovery plans and minimize risk, law firms should be initiating sandbox simulation tests at least twice a year. When possible, full-scale testing is the most true-to-life testing method and should be considered. Test to Minimize Your Risk Please indicate what type(s) of DR testing you are currently using. 10% 20% 30% 15% 25% 5% Tabletop Tests (Teams Review the DR Plan) Sandbox Simulation (Technology is Testing in Isolation, with No Impact to Production) Full-Scale Testing (Full Failover and Failback Testing of Production Environment) 0% 16% 28% 11%
  • 9. 9 IT Departments are Facing Increased Pressure from Auditors and Regulators Percentage of respondents that claimed to face audits and regulations regarding IT data protection 51% 23% “strongly agree” | 28% “somewhat agree” | 27% “neither agree nor disagree” | 14% “somewhat disagree” | 8% “strongly disagree” How strongly do you agree with the following statement: “My organization is facing increasing pressure from IT audits and regulations”?
  • 10. 10 Clients are Putting More Pressure on IT Departments 42% Percentage of respondents who claimed clients are requesting information about their firms’ IT operations and data protection policies Because law firms house large quantities of sensitive client data, IT departments are facing increased scrutiny — especially those whose law firms provide service to clients in the banking industry. 11% “strongly agree” | 31% “somewhat agree” | 25% “neither agree nor disagree” | 13% “somewhat disagree” | 20% “strongly disagree” How strongly do you agree with the following statement: “More of my clients are requesting information about my firm’s IT operations and data protection policies”?
  • 12. Key Insights Success is Strained When IT Teams Lack Resources IT professionals at legal firms are expected to be reactive to the needs of their partners. However, stretched budgets (59%) and overburdened IT staff (40%) make it difficult to embrace change in an era where it’s critical to mitigate risks. Because downtime can be hugely detrimental to a firm’s reputation and livelihood, a proactive approach to DR is essential. In Cisco’s 2015 Annual Security Report, law firms ranked as the seventh most vulnerable business sector to cyber attacks. Because legal proceedings often rely on sensitive client information, hackers see an opportunity for profit and target firms for this data. No wonder 69% of respon- dents have ranked “data security” as the biggest challenge to their firms’ IT operations. Data Security is a Top Priority Confidence Must Be Based On Evidence Since data is has become a cornerstone of the modern legal practice, it’s no surprise that regulators are taking more steps to ensure continuity and clients are requesting proof of resiliency. Yet when 68% percent of respondents express confidence in their DR plans and simultaneously fail to articulate their testing methods, constituents may see this disconnect as an inability to survive in the face of crisis. 62% of firms don’t know what DR tests they perform or have no DR tests at all, which poses a major security risk since vulnerabilities aren’t being identified. Furthermore, it implies that their confidence in resiliency may be unfounded.
  • 13. 13 Leverage IT Security and DR to Minimize Your Firm’s Risk Information Security practices need to have direct ties to IT incident response procedures. Law firms are increasingly turning to more modern and secure IT disaster recovery solutions to improve their security and resiliency posture. By leveraging Disaster-Recovery-as-a-Service (DRaaS), firms are making huge strides from existing backup-based or depreciated infrastructure to overcoming tight budget and personnel constraints with robust data protection. Taking steps to improve a DR strategy protects your law firm’s reputation, client trust and – ultimately – revenue. “The reality is if your information system is taken down for whatever reason: a flood, malware, hack attack, etc., you still have a business continuity and disaster recovery issue on your hands.” - Ken Beaver, TechTarget
  • 14. 14 Why Law Firms are Turning to Bluelock Legal firms are turning to Bluelock because we are dedicated to their security and empowerment. Our Disaster Recovery-as-a-Service (DRaaS) isn’t just data protection. It’s the seamless delivery of a digital experience, no matter the technology, so that your firm can tackle your future with certainty. Serving as an expert extension of your IT team in handling the end-to-end responsibilities of DR planning, testing and maintenance, Bluelock gives your IT talent the freedom to focus on other, more pressing objectives that drive direct value to your law firm. Worried about proof to constituents? Our client portal, Bluelock Portfolio™, offers complete visibility with recovery metrics for even the most skeptical stakeholders, auditors or clients. Our unique service program, Recovery Assurance™, offers verifiable evidence of recoverability and security. For more information about Bluelock, visit bluelock.com/law.
  • 15. Jumpstart your strategy by visiting our Practical Guide to DRaaS. www.bluelock.com | 888.402.2583 | Indianapolis · Las Vegas