SlideShare a Scribd company logo
1 of 27
Benchmarking Your Firm
Against Best Practices
IT Compliance
Moderator:
Mitch Hungerpiller, Mitchell-Wayne Technologies
Panelists:
Mark Abendroth, Abendroth & Russell PC
Anna Alvarado, Couch, Conville & Blitt
Brenda Majewski, Kohn Law Firm S.C.
1. Where does your firm compare with information
technology best practices?
2. What are those best practices that help you survive a
security audit and satisfy audit exceptions for compliance?
3. What does it cost for all this security and best practice
deployment and management?
1. Hear from our very experienced panel on successes and
war stories to be better prepared to face your IT issues and
audit within your budget!
IT Compliance from a
Vendor’s Perspective
By
Mitch Hungerpiller, Sr. CPA
President & Founder
IT Best Practices & Civil Procedure
• December 2006 Amendment of the Federal
Rules of Civil Procedure (FRCPA) 34(a) and
34(b) cite retention policies of electronically
stored information (“ESI”) used in the normal
course of business for discovery in litigation.
– This is driving the compliance audits
– Comply with e-discovery required practices or pay
the piper
– Deleted data NEVER goes away
IT Management Viewpoint
• Optimal Environment for Stable Systems are
to NOT CHANGE them!
– Compliance mandates that patches be applied
weekly for Microsoft OS’s
– Compliance mandates that firmware be updated
on firewall’s within a reasonable period of time
– Compliance mandates that policies be followed
whenever something changes
– Compliance mandates all antivirus, antimalware
and content filters be updated & maintained daily
IT Professionals Do NOT Make Policy
• IT professionals program, support and maintain
systems that automate tasks
• IT professionals translate business policies and
program systems to comply with those policies
• IT professionals carry numerous core
competences and skills similar to law, medicine,
accounting and engineering
• Business Polices of Collection Law Firms and
Agencies are created at the firm or agency level
Compliance Policies are Uniquely
Created for Your Business
IT Compliance Budget Busters
Network & Facility
• Security
– email appliances,
– network,
– data at rest encryption
– certificate maintenance
– PCI Scans
• Change Control
• File Integrity Monitoring
• Voice & Video Recordings
Business Continuity
• Image Based Backups vs. File
• DR Restores Off Premise
• Vaulting of Backups
• Internet Bandwidth via Fiber
(Full Duplex)
• Competent IT Professionals
Summary IT Compliance Best Practices
• Use Microsoft Group Policy to Manage Security
• Automate as Much as Possible
• Review Logs Daily
• Maintain Renewal Dates for Annual Subscriptions
• Use Managed Services when Possible
• Include IT Professionals in Management Meetings
• Budget for Technology Refreshes at HW Warranty
Expirations
• Allocate Sufficient Resources for IT
Panel Discussions
Brenda Majewski
Kohn Law Firm S.C.
• Password security enforcement – Cost = 0.
• The 2014 most popular passwords remained
“password” and “123456” (specopssoft.com*)
Change often.
• Helpdesk “cost” to reset passwords $25/user.*
• Increase length and complexity, ie:
N@rc@2015! vs. Narca2015
Malware
Firewall
Virus protection
Employees - are they your weakest information technology link?
Clicking on links
Prohibit downloads
Permissible purpose documentation. Business resources.
Cellphones TCPA Scrubs Dialers
Next up wearable technology – policies and permissible
purposes
Get SMART
Specific – target a specific area for improvement.
Measurable – quantify or at least suggest an indicator of
progress.
Assignable – specify who will do it.
Realistic – state what results can realistically be achieved, given
available resources.
Time-related – specify when the result(s) can be achieved.
Issue: Employee desktop activity in the Firm's
Accounting Room is not viewable via their Surveillance
(CCTV) system. The camera view in this area is able to
identify employees at their desks, but does not
capture their payment posting activity.
PCI requirements – when two clients conflict
One client gives you one login
What does “/” mean - remove and disable or
remove or disable
Retain docs and SOPS that control the date of the action that
occurred –Don’t retain only the newest SOP –
Call Recording Retention 13 months
Calls: 3 months Call Auditing Forms: 12 months
• The American Bar Association’s Model Rules of
Professional Conduct, adopted in whole or in
part by all states except California, include Rule
1.6(c): “A lawyer shall make reasonable efforts
to prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to,
information relating to the representation of a
client.” (California’s is even tougher.)
Panel Discussions
Anna Alvarado
Couch, Conville & Blitt
Chief Operating Officer IT Vendor
Department Manager
Database
Administrator
Database
Administrator
General Best Practices…
• 3rd party vendor should be coupled with internal IT staff
• IT professionals/vendors are your support system and
you should rely on them as subject matter experts
• We hire IT professionals for a reason…SUPPORT,
GUIDANCE but most importantly EXPERTISE
• Ask a lot of questions…most executives only have a
general/basic understanding of the IT world, it’s terms,
the equipment, etc.
• Manage expectations of vendor with continuous and
candid communication.
Best Practices
ommunication
• Monthly calls or at a minimum quarterly
• Review written expectations…who, what, when, why and
how?
• Ultimately IT Compliance is the firms responsibility
• Inspect server room, phone systems, internet,
emails and camera's are functioning properly
• Ensure confirmation for server back up are
received and logged daily
• Test locks on all secured doors
• Test alarms for front, rear and server rooms
• Make sure all logs are in place
• Test internet usage for social media and/or other
prohibited sites
Helpful Tips:
Daily/Weekly/Monthly Checklist
Panel Discussions
Mark Abendroth
Abendroth and Russell, PC
Law Firm Security Issues to Consider
Encryption
Full Disc Encryption of laptops and other
devices
BYOD Bring your own device
Whose phone is it?
Software for a remote “wipe”
Never access a free hotspot at Starbucks
Law Firm Security Issues to Consider
Vendor Management
A lawyer should be mindful of the obligation
to “act competently to safeguard information
relating to the representation of a client against
inadvertent or unauthorized disclosure…”
ABA Model Rule 1.6, comment 16
Law Firm Security Issues to Consider
• How are your venders managing data of your
clients?
• Written Contracts with Confidentiality
Agreements are crucial
• Your clients will want to see these contracts

More Related Content

What's hot

CEO's Guide Effective IT Management
CEO's Guide Effective IT ManagementCEO's Guide Effective IT Management
CEO's Guide Effective IT Managementguest86c967
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
Software and Tear
Software and TearSoftware and Tear
Software and TearJosh Howell
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader pptBimadRajSinha1
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmart ERP Solutions, Inc.
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales PresentationMSI Services
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overviewcomania
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
Website homepage presentation
Website homepage presentationWebsite homepage presentation
Website homepage presentationpeaceofmintech
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceCitrin Cooperman
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentationAshita Mehra
 

What's hot (20)

CEO's Guide Effective IT Management
CEO's Guide Effective IT ManagementCEO's Guide Effective IT Management
CEO's Guide Effective IT Management
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
Software and Tear
Software and TearSoftware and Tear
Software and Tear
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoft
 
Proventiv Sales Presentation
Proventiv Sales PresentationProventiv Sales Presentation
Proventiv Sales Presentation
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
Kaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT DirectorsKaseya: 5 Tips for Healthcare IT Directors
Kaseya: 5 Tips for Healthcare IT Directors
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Isms3
Isms3Isms3
Isms3
 
The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Website homepage presentation
Website homepage presentationWebsite homepage presentation
Website homepage presentation
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote WorkforceTRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
TRU Snacks Webinar Series - Effective Technology for Managing a Remote Workforce
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 

Viewers also liked

Viewers also liked (13)

Rebekah clark may 2016 nc
Rebekah clark may 2016 ncRebekah clark may 2016 nc
Rebekah clark may 2016 nc
 
UTPBGraduateTranscript-Satterfield
UTPBGraduateTranscript-SatterfieldUTPBGraduateTranscript-Satterfield
UTPBGraduateTranscript-Satterfield
 
August MTU
August MTUAugust MTU
August MTU
 
Ewan Hooper - Selection of Work
Ewan Hooper - Selection of WorkEwan Hooper - Selection of Work
Ewan Hooper - Selection of Work
 
Resep Macaroni Schotel Kukus
Resep Macaroni Schotel KukusResep Macaroni Schotel Kukus
Resep Macaroni Schotel Kukus
 
бби презентация
бби  презентация бби  презентация
бби презентация
 
Progetto "Il MUSEO nel LICEO"
Progetto "Il MUSEO nel LICEO"Progetto "Il MUSEO nel LICEO"
Progetto "Il MUSEO nel LICEO"
 
безопасность интернета
безопасность интернетабезопасность интернета
безопасность интернета
 
Gibco Catalog 2015 ©
Gibco Catalog 2015 ©Gibco Catalog 2015 ©
Gibco Catalog 2015 ©
 
causesofworldwar2-130425060416-phpapp01 (1)
causesofworldwar2-130425060416-phpapp01 (1)causesofworldwar2-130425060416-phpapp01 (1)
causesofworldwar2-130425060416-phpapp01 (1)
 
Jonathannnnnnnnnn.xlsx
Jonathannnnnnnnnn.xlsxJonathannnnnnnnnn.xlsx
Jonathannnnnnnnnn.xlsx
 
How to manage WebWerks Cloud VPS ?
How to manage WebWerks Cloud VPS ?How to manage WebWerks Cloud VPS ?
How to manage WebWerks Cloud VPS ?
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 

Similar to NARCA Presentation - IT Best Practice

Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsBill Malchisky Jr.
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessManageEngine
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business CasePerficient, Inc.
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitTechSoup Canada
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessMobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessSasha Levage
 
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with lessMobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with lessSasha Levage
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Software
 
T CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterT CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterGary Pennington
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 

Similar to NARCA Presentation - IT Best Practice (20)

Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino Admins
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
SNW Fall 2009
SNW Fall 2009SNW Fall 2009
SNW Fall 2009
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofit
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with lessMobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with lessMobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
T CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit CenterT CompliIT Compliance: Shifting from Cost Center to Profit Center
T CompliIT Compliance: Shifting from Cost Center to Profit Center
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 

NARCA Presentation - IT Best Practice

  • 1. Benchmarking Your Firm Against Best Practices IT Compliance
  • 2. Moderator: Mitch Hungerpiller, Mitchell-Wayne Technologies Panelists: Mark Abendroth, Abendroth & Russell PC Anna Alvarado, Couch, Conville & Blitt Brenda Majewski, Kohn Law Firm S.C.
  • 3. 1. Where does your firm compare with information technology best practices? 2. What are those best practices that help you survive a security audit and satisfy audit exceptions for compliance? 3. What does it cost for all this security and best practice deployment and management? 1. Hear from our very experienced panel on successes and war stories to be better prepared to face your IT issues and audit within your budget!
  • 4. IT Compliance from a Vendor’s Perspective By Mitch Hungerpiller, Sr. CPA President & Founder
  • 5. IT Best Practices & Civil Procedure • December 2006 Amendment of the Federal Rules of Civil Procedure (FRCPA) 34(a) and 34(b) cite retention policies of electronically stored information (“ESI”) used in the normal course of business for discovery in litigation. – This is driving the compliance audits – Comply with e-discovery required practices or pay the piper – Deleted data NEVER goes away
  • 6. IT Management Viewpoint • Optimal Environment for Stable Systems are to NOT CHANGE them! – Compliance mandates that patches be applied weekly for Microsoft OS’s – Compliance mandates that firmware be updated on firewall’s within a reasonable period of time – Compliance mandates that policies be followed whenever something changes – Compliance mandates all antivirus, antimalware and content filters be updated & maintained daily
  • 7. IT Professionals Do NOT Make Policy • IT professionals program, support and maintain systems that automate tasks • IT professionals translate business policies and program systems to comply with those policies • IT professionals carry numerous core competences and skills similar to law, medicine, accounting and engineering • Business Polices of Collection Law Firms and Agencies are created at the firm or agency level
  • 8. Compliance Policies are Uniquely Created for Your Business
  • 9. IT Compliance Budget Busters Network & Facility • Security – email appliances, – network, – data at rest encryption – certificate maintenance – PCI Scans • Change Control • File Integrity Monitoring • Voice & Video Recordings Business Continuity • Image Based Backups vs. File • DR Restores Off Premise • Vaulting of Backups • Internet Bandwidth via Fiber (Full Duplex) • Competent IT Professionals
  • 10. Summary IT Compliance Best Practices • Use Microsoft Group Policy to Manage Security • Automate as Much as Possible • Review Logs Daily • Maintain Renewal Dates for Annual Subscriptions • Use Managed Services when Possible • Include IT Professionals in Management Meetings • Budget for Technology Refreshes at HW Warranty Expirations • Allocate Sufficient Resources for IT
  • 12. • Password security enforcement – Cost = 0. • The 2014 most popular passwords remained “password” and “123456” (specopssoft.com*) Change often. • Helpdesk “cost” to reset passwords $25/user.* • Increase length and complexity, ie: N@rc@2015! vs. Narca2015
  • 13. Malware Firewall Virus protection Employees - are they your weakest information technology link? Clicking on links Prohibit downloads Permissible purpose documentation. Business resources.
  • 14. Cellphones TCPA Scrubs Dialers Next up wearable technology – policies and permissible purposes Get SMART Specific – target a specific area for improvement. Measurable – quantify or at least suggest an indicator of progress. Assignable – specify who will do it. Realistic – state what results can realistically be achieved, given available resources. Time-related – specify when the result(s) can be achieved.
  • 15. Issue: Employee desktop activity in the Firm's Accounting Room is not viewable via their Surveillance (CCTV) system. The camera view in this area is able to identify employees at their desks, but does not capture their payment posting activity.
  • 16. PCI requirements – when two clients conflict One client gives you one login What does “/” mean - remove and disable or remove or disable
  • 17. Retain docs and SOPS that control the date of the action that occurred –Don’t retain only the newest SOP – Call Recording Retention 13 months Calls: 3 months Call Auditing Forms: 12 months
  • 18. • The American Bar Association’s Model Rules of Professional Conduct, adopted in whole or in part by all states except California, include Rule 1.6(c): “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” (California’s is even tougher.)
  • 20. Chief Operating Officer IT Vendor Department Manager Database Administrator Database Administrator
  • 21. General Best Practices… • 3rd party vendor should be coupled with internal IT staff • IT professionals/vendors are your support system and you should rely on them as subject matter experts • We hire IT professionals for a reason…SUPPORT, GUIDANCE but most importantly EXPERTISE • Ask a lot of questions…most executives only have a general/basic understanding of the IT world, it’s terms, the equipment, etc. • Manage expectations of vendor with continuous and candid communication.
  • 22. Best Practices ommunication • Monthly calls or at a minimum quarterly • Review written expectations…who, what, when, why and how? • Ultimately IT Compliance is the firms responsibility
  • 23. • Inspect server room, phone systems, internet, emails and camera's are functioning properly • Ensure confirmation for server back up are received and logged daily • Test locks on all secured doors • Test alarms for front, rear and server rooms • Make sure all logs are in place • Test internet usage for social media and/or other prohibited sites Helpful Tips: Daily/Weekly/Monthly Checklist
  • 25. Law Firm Security Issues to Consider Encryption Full Disc Encryption of laptops and other devices BYOD Bring your own device Whose phone is it? Software for a remote “wipe” Never access a free hotspot at Starbucks
  • 26. Law Firm Security Issues to Consider Vendor Management A lawyer should be mindful of the obligation to “act competently to safeguard information relating to the representation of a client against inadvertent or unauthorized disclosure…” ABA Model Rule 1.6, comment 16
  • 27. Law Firm Security Issues to Consider • How are your venders managing data of your clients? • Written Contracts with Confidentiality Agreements are crucial • Your clients will want to see these contracts