SlideShare a Scribd company logo
How to Prevent Your Client’s Data from Getting Hacked
on February 26th, 2014

Andy Wilson
Co-founder of Logikcull.com
andy@logikcull.com
@iDedupe
C

C

C

C

C

As cyber-criminals continue to seek new opportunities for their
break-ins, law firms constitute low-hanging fruit.
Digital espionage is estimated to cost American companies over $50 billion per year, according
to Harvard Journal of Law & Technology , and 10% of the advanced cyberattacks were targeted
at law firms. A recent study published by the American Bar Association estimates the average
data breach to cost $7.2 million, with an averaged cost of $214 per client record.
And you thought
eDiscovery was expensive!

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

Why is a law practice particularly tempting?

How to Prevent Your Client’s Data from Getting Hacked

C

C
C

C
1-2-3

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

1. Concentration of sensitive documents
1

Large law firms tend to hold significant accumulations of private financial information,
including due diligence materials, negotiation strategies, specific details on technological
secrets, and many other critical items. In a globalized corporate environment, such
materials as these can be worth millions of dollars to foreign intelligence interests.

2. Law firms have notoriously poor data security
3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C
2

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
Lucy Thompson, Chair of the ABA, points out that information released to law firms often
enters an unguarded arena: “Its possible the information comes from a very secure source,
a company with very good security. Then it goes to a law firm, and who knows what kind of
security they are going to have.”

3. Information is pre-sorted for value

How to Prevent Your Client’s Data from Getting Hacked

C
C

C
3

C

C

C

1. Concentration of sensitive documents
2. Law firms have notoriously poor data security
3. Information is pre-sorted for value
Large companies accumulate vast quantities of documents, most of which have no
usefulness to cybercriminals and corporate spies. A company’s outside counsel, however,
will only possess materials with the greatest sensitivity and value, so the interested hacker
doesn’t have to sift through mountains of unrelated material.

How to Prevent Your Client’s Data from Getting Hacked

You guys know ALL
about this, eh?

C
C

C

C

C

C

So what can a law firm do to better protect client data?

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

1. Minimize data storage locations
Each data storage location increases your overall exposure to possible compromise, and
multiplies the effort you have to expend to keep data secure. Minimizing the number of
storage locations and devices will simplify your data security program and decrease the
chances of overlooking a vulnerability. Storing all sensitive data at a central cloud location
with strong access controls and monitoring is usually the best choice.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

2. Encrypt your “data at rest”
“Data at rest” is an IT term that simply refers to inactive stored information. There are two
approaches to keeping inactive data safe from hacking: Access controls and data
encryption. Encryption is a way of scrambling information according to a certain pattern, so
that only the users who have access to that pattern (or “key”) can unscramble it and make
it readable. Encryption technology is an excellent way to prevent data theft, since even if
the database is hacked, the thieves wont be able to actually use the material they steal.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

C

3. Protect data in transit
When data is in transit, it can be subject to eavesdropping or tampering at various points
in its journey. Prior to transferring any customer data, ensure that the site domain name
matches what you expect, and that the URL shows “https” instead of just “http”. Email
should not be considered a secure transport channel unless steps are taken to encrypt the
message before sending it. By default, all emails, particularly those which travel outside of
your own domain, are unencrypted and are subject to eavesdropping and theft.

How to Prevent Your Client’s Data from Getting Hacked

C
C

C

C

C

4. Secure your devices
The final piece in a program of keeping client data safe is to make sure that devices
themselves are safe. The Journal of the American Bar Association highlights a survey
showing that 36% of lawyers who use smartphones have lost them at some point, and
46% of those lost phones were not even protected by a password of any kind.

How to Prevent Your Client’s Data from Getting Hacked

C

C
C

C
(

(

(

C

C
(

(

C

(

(

Summary
Following the outlined principles will help ensure that your law offices client
data is only stored in absolutely necessary locations, is protected with access
controls and encryption, is transmitted securely, and resides on safe, malwarefree devices. Enacting a cloud-based security program will give your clients
confidence in the professionalism and discretion of your practice, and will
comply with American Bar Association standards for taking reasonable,
competent measures to protect client information.

How to Prevent Your Client’s Data from Getting Hacked

(

C
(
C

C
(

(

(

C

C
(

(

C

(

(

(

C

Download the complete
white paper at:

http://logikcull.com/white-papers

How to Prevent Your Client’s Data from Getting Hacked

(
C

C
(

(

(

C

C
(

(

C

(

About Logikcull.com
Logik is the creator of www.logikcull.com ­ the leading cloud­based eDiscovery platform.
Logikcull is ideal for corporations and law firms that want an easy­to­use, affordable, and
secure eDiscovery platform without needing to invest in significant hardware and software
costs. Logikcull can be accessed using PCs and Macs as well as mobile devices including
the iPhone and iPad.
To keep customer data secure, Logikcull.com resides behind an enterprise SSAE16 SOC­1
Type II certified data center. For added security and customer comfort, Logikcull is not
hosted in a public cloud like Amazon Web Services (AWS). Some use cases for Logikcull are:
eDiscovery & document review, information governance, document archiving, document
collaboration, deal rooms, matter mobility, and internal investigations.
Logik is headquartered in Washington, DC and was founded by Andy Wilson and Sheng
Yang in 2004. Visit www.logikcull.com, email questions@logikcull.com, call 1­800­951­
5507 or follow us on Twitter @logikcull.
Learn more at: http://logikcull.com

How to Prevent Your Client’s Data from Getting Hacked

(

(

C
(

More Related Content

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXUXDXConf
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyUXDXConf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

How to Prevent Your Client’s Data from Getting Hacked

  • 1. How to Prevent Your Client’s Data from Getting Hacked on February 26th, 2014 Andy Wilson Co-founder of Logikcull.com andy@logikcull.com @iDedupe
  • 2. C C C C C As cyber-criminals continue to seek new opportunities for their break-ins, law firms constitute low-hanging fruit. Digital espionage is estimated to cost American companies over $50 billion per year, according to Harvard Journal of Law & Technology , and 10% of the advanced cyberattacks were targeted at law firms. A recent study published by the American Bar Association estimates the average data breach to cost $7.2 million, with an averaged cost of $214 per client record. And you thought eDiscovery was expensive! How to Prevent Your Client’s Data from Getting Hacked C
  • 3. C C C C Why is a law practice particularly tempting? How to Prevent Your Client’s Data from Getting Hacked C C
  • 4. C C 1-2-3 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 5. C C C C C 1. Concentration of sensitive documents 1 Large law firms tend to hold significant accumulations of private financial information, including due diligence materials, negotiation strategies, specific details on technological secrets, and many other critical items. In a globalized corporate environment, such materials as these can be worth millions of dollars to foreign intelligence interests. 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 6. C C 2 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security Lucy Thompson, Chair of the ABA, points out that information released to law firms often enters an unguarded arena: “Its possible the information comes from a very secure source, a company with very good security. Then it goes to a law firm, and who knows what kind of security they are going to have.” 3. Information is pre-sorted for value How to Prevent Your Client’s Data from Getting Hacked C
  • 7. C C 3 C C C 1. Concentration of sensitive documents 2. Law firms have notoriously poor data security 3. Information is pre-sorted for value Large companies accumulate vast quantities of documents, most of which have no usefulness to cybercriminals and corporate spies. A company’s outside counsel, however, will only possess materials with the greatest sensitivity and value, so the interested hacker doesn’t have to sift through mountains of unrelated material. How to Prevent Your Client’s Data from Getting Hacked You guys know ALL about this, eh? C
  • 8. C C C C C So what can a law firm do to better protect client data? How to Prevent Your Client’s Data from Getting Hacked C
  • 9. C C C C C 1. Minimize data storage locations Each data storage location increases your overall exposure to possible compromise, and multiplies the effort you have to expend to keep data secure. Minimizing the number of storage locations and devices will simplify your data security program and decrease the chances of overlooking a vulnerability. Storing all sensitive data at a central cloud location with strong access controls and monitoring is usually the best choice. How to Prevent Your Client’s Data from Getting Hacked C
  • 10. C C C C C 2. Encrypt your “data at rest” “Data at rest” is an IT term that simply refers to inactive stored information. There are two approaches to keeping inactive data safe from hacking: Access controls and data encryption. Encryption is a way of scrambling information according to a certain pattern, so that only the users who have access to that pattern (or “key”) can unscramble it and make it readable. Encryption technology is an excellent way to prevent data theft, since even if the database is hacked, the thieves wont be able to actually use the material they steal. How to Prevent Your Client’s Data from Getting Hacked C
  • 11. C C C C C 3. Protect data in transit When data is in transit, it can be subject to eavesdropping or tampering at various points in its journey. Prior to transferring any customer data, ensure that the site domain name matches what you expect, and that the URL shows “https” instead of just “http”. Email should not be considered a secure transport channel unless steps are taken to encrypt the message before sending it. By default, all emails, particularly those which travel outside of your own domain, are unencrypted and are subject to eavesdropping and theft. How to Prevent Your Client’s Data from Getting Hacked C
  • 12. C C C C 4. Secure your devices The final piece in a program of keeping client data safe is to make sure that devices themselves are safe. The Journal of the American Bar Association highlights a survey showing that 36% of lawyers who use smartphones have lost them at some point, and 46% of those lost phones were not even protected by a password of any kind. How to Prevent Your Client’s Data from Getting Hacked C C
  • 13. C C ( ( ( C C ( ( C ( ( Summary Following the outlined principles will help ensure that your law offices client data is only stored in absolutely necessary locations, is protected with access controls and encryption, is transmitted securely, and resides on safe, malwarefree devices. Enacting a cloud-based security program will give your clients confidence in the professionalism and discretion of your practice, and will comply with American Bar Association standards for taking reasonable, competent measures to protect client information. How to Prevent Your Client’s Data from Getting Hacked ( C (
  • 14. C C ( ( ( C C ( ( C ( ( ( C Download the complete white paper at: http://logikcull.com/white-papers How to Prevent Your Client’s Data from Getting Hacked (
  • 15. C C ( ( ( C C ( ( C ( About Logikcull.com Logik is the creator of www.logikcull.com ­ the leading cloud­based eDiscovery platform. Logikcull is ideal for corporations and law firms that want an easy­to­use, affordable, and secure eDiscovery platform without needing to invest in significant hardware and software costs. Logikcull can be accessed using PCs and Macs as well as mobile devices including the iPhone and iPad. To keep customer data secure, Logikcull.com resides behind an enterprise SSAE16 SOC­1 Type II certified data center. For added security and customer comfort, Logikcull is not hosted in a public cloud like Amazon Web Services (AWS). Some use cases for Logikcull are: eDiscovery & document review, information governance, document archiving, document collaboration, deal rooms, matter mobility, and internal investigations. Logik is headquartered in Washington, DC and was founded by Andy Wilson and Sheng Yang in 2004. Visit www.logikcull.com, email questions@logikcull.com, call 1­800­951­ 5507 or follow us on Twitter @logikcull. Learn more at: http://logikcull.com How to Prevent Your Client’s Data from Getting Hacked ( ( C (