SlideShare a Scribd company logo
www.intercontinental-finance.comCYBER SECURITY
Intercontinental Finance & Law • 146/17
READY FOR
A FIGHT BACK
When it comes to the issue of cyber security,the
legal sector has more to worry about than most.
With the frequent handling of confidential data and
barristers and lawyers regularly working remotely,
there are more risks to consider if firms are to
ensure they remain properly protected. But doing
this requires a significant financial investment,
and this often comes straight out of partners’
pockets.However, payment-over-time models
are set to give firms a helping hand in taking
a proactive security approach.
CYBER-SECURITY HAS ALWAYS
BEEN A HOT TOPIC FOR
BUSINESSES OF ALL SHAPES
AND SIZES, but its importance has
been dramatically amplified in recent
months due to a spate of major attacks.
The WannaCry ransomware incident –
the May 2017 worldwide cyberattack by the
WannaCry ransomware cryptoworm, which
targeted computers running the Microsoft
Windows operating system by encrypting
data and demanding ransom payments in
the Bitcoin cryptocurrency – was without
doubt the most serious of the year so far,
affecting computers across 99 different
countries, including those belonging to
the National Health Service (NHS) in the
UK, Telefónica in Spain and a number of
domestic banks in Russia to name but a few.
Around a month later, another attack hit the
UK’s parliament which left many MPs unable
to access their emails, while a couple of days
later the well-known Petya attack crippled
numerous major firms and industries in
Ukraine. These are just a small handful of the
attacks that made national headlines.
Chris Labrey
HOW TO RETALIATE AGAINST
CYBER THREATS WITH
PAYMENT-OVER-TIME MODELS
20
www.intercontinental-finance.com CYBER SECURITY
21
Chris Labrey is managing director, UK & Ireland at Econocom, a European
provider of business-to-business digital services. Founded in 1974 by
Jean-Louis Bouchard as Europe Computer Systèmes (ECS), the company
is headquartered in Brussels, Belgium. With operations in 19 countries, it
employs 10,000 people and has seven million digital assets managed.
It is likely that the vast majority of these
could have been prevented if the appropriate
security measures were implemented in the
first place, which is why cyber-security must
be at the top of every businesses’ priority list,
that is if it isn’t already. The truth is that no
business can truly consider themselves safe
from the threat of hackers and cyber criminals,
and certain industries will find themselves
particularly susceptible to attacks.
This rings true for the legal sector, and
law firms more particularly. The regular
handling of highly-important and confidential
information makes these firms highly-
desirable targets for many malicious cyber
criminals. If they are able to access the
relevant systems and seize this information
themselves, they can either leak it on the
dark web in return for financial gain or simply
use it to destroy the reputational value of the
law firm in question.
This is why it is imperative that all law
firms are proactive in ensuring they have
comprehensive cyber-security measures in
place, but of course it is not always as easy
as it sounds, with several potential obstacles
that can slow down the journey towards a
secure IT infrastructure.
The biggest issue that many firms
struggle with is being able to account for
the significant capital expenditure that is
required for truly comprehensive cyber
protection. It is rare that they are able to
pay these sums without facing some sort of
negative financial repercussions, especially
considering the fact that the money to pay
for this protection is often coming directly out
of the partners’ pockets. This, unsurprisingly,
makes it much harder to adopt a proactive
cyber security approach, despite the best
intentions of firms.
All hope need not be lost, however,
because there is something that can help
ease the strain of adopting cyber security
measures for firms of all sizes – payment-
over-time models.
These payment-over-time models offer a
21st century solution that reflects our ‘renter
society’ sensibilities, and their benefits
are being realised by particularly security-
conscious law firms. In the same way that
many of us pay for our mobile phones,
cars and home insurance in monthly
instalments, the legal sector is popularising
the adoption of the same model to pay for
cyber security protection.
The most obvious benefit of this model is
that there is suddenly no longer a need for
large, one-off payments in order to ensure
sufficient cyber protection. Instead, the
overall cost is simply divided into smaller,
more manageable chunks that are then paid
over a pre-determined period of time. This
instantly helps to alleviate the financially-
induced headaches that so many firms
suffer from, allowing them to improve their
cyber-security without having to put all other
operations on hold.
Increased flexibility is another valuable
advantage of payment-over-time models.
The cyber threat is continuing to evolve, with
hackers devising new ways of infiltrating
IT systems to devastating effect, and so
law firms must be able to quickly adapt
and refresh their security measures in
order to stay protected in the long-term.
With payment-over-time models, outdated
systems can be swapped out for state-of-the-
art replacements, with no need for another
crippling capital expenditure investment. It’s
the ideal solution for those looking to take a
future-proofed approach to security.
In addition, by matching the subscription
term with the refresh cycle, firms reduce the
risks of their existing IT systems becoming
obsolete. Rolling out a comprehensive
digital security project takes time, but
with a dedicated facility, the costs can be
warehoused so the firm only begins paying
for the new system one it has been fully
implemented and is live. At a time when
businesses might also be
paying for the support of a
legacy security system
during the transition
period, this is a
strategy that enables
cash to be spent
in other areas of
the business in the
interim.
Intercontinental Finance & Law • 146/17
It is only understandable that the majority
of fast-growing law firms will be sceptical
about investing significant portions of their
finances on IT security defences. If they find
themselves having to double their number
of employees over a 12-month period, for
example, then the systems they would have
initially invested in will likely no longer be
fit for purpose. This is yet another problem
that can be solved through payment-over-
time models, allowing firms to scale their IT
estates and security measures up or down
according to business requirements at any
given time. By adopting this approach,
businesses can match their investment
costs with benefits over time.
Law firms are extremely vulnerable targets
when it comes to cyber attacks, and the
repercussions of suffering from a successful
attack can be disastrous: the financial and
reputation damage can often bring firms
to their knees. This is why the legal sector
cannot afford to ignore the risks that are
staring them in the face – they must
adopt payment-over-time models
to effectively fight back. By
workingwithatrustedpartnerto
come up with a tailor-made
model that meets each and
every business require-
ment, firms can guarantee
c o m p r e h e n s i v e
protection without any
financial nightmares. l

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Vaibhav Jain
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Blockchain in insurance
Blockchain in insuranceBlockchain in insurance
Blockchain in insurance
zaarahary
 
The Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar DeckThe Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar Deck
The Digital Insurer
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
CompTIA
 
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Antoniou McCollum & Co. LLC
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
Colleen Beck-Domanico
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
Christopher Dorobek
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskDominika Rusek
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
Olivier Busolini
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Creus Moreira Carlos
 
Blockchain in Insurance: Risk Not, Reap Not
Blockchain in Insurance: Risk Not, Reap NotBlockchain in Insurance: Risk Not, Reap Not
Blockchain in Insurance: Risk Not, Reap Not
Cognizant
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
Barry Greene
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Shawn Tuma
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
Kevin Duffey
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
OurCrowd
 

What's hot (19)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Blockchain in insurance
Blockchain in insuranceBlockchain in insurance
Blockchain in insurance
 
The Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar DeckThe Insurance Blockchain - Webinar Deck
The Insurance Blockchain - Webinar Deck
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
Digital & Technology Practice | Antoniou McCollum & Co. | Leading Cyprus law ...
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Blockchain in Insurance: Risk Not, Reap Not
Blockchain in Insurance: Risk Not, Reap NotBlockchain in Insurance: Risk Not, Reap Not
Blockchain in Insurance: Risk Not, Reap Not
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 

Similar to HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
Dharmendra Rama
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
IBM Security
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
incmagazineseo
 
Ey managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurityEy managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurity
crazyivan389
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
topseowebmaster
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdf
Ciente
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
Abraham Vergis
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
Dean Bonehill ♠Technology for Business♠
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
Helen Carpenter
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
Kleomenis Symeon
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
aakash malhotra
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
Simon Clements FIRP DipRP
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
Cigniti Technologies Ltd
 

Similar to HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS (20)

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Cyber
Cyber Cyber
Cyber
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Ey managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurityEy managing-real-estate-cybersecurity
Ey managing-real-estate-cybersecurity
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdf
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
BT Cloud Security Whitepaper
BT Cloud Security WhitepaperBT Cloud Security Whitepaper
BT Cloud Security Whitepaper
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 

Recently uploaded

when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
EasyReports
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
AbdulNasirNichari
 
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt FinancingHow Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
Vighnesh Shashtri
 
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfBONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
coingabbar
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
egoetzinger
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
VohnArchieEdjan
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
University of Calabria
 
Managing marketing information to gain customer insights
Managing marketing information to gain customer insightsManaging marketing information to gain customer insights
Managing marketing information to gain customer insights
sanamalam3
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 

Recently uploaded (20)

when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports5 Tips for Creating Standard Financial Reports
5 Tips for Creating Standard Financial Reports
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
 
Patronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptcPatronage and Good Governance 5.pptx pptc
Patronage and Good Governance 5.pptx pptc
 
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt FinancingHow Non-Banking Financial Companies Empower Startups With Venture Debt Financing
How Non-Banking Financial Companies Empower Startups With Venture Debt Financing
 
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfBONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdf
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
 
Managing marketing information to gain customer insights
Managing marketing information to gain customer insightsManaging marketing information to gain customer insights
Managing marketing information to gain customer insights
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 

HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS

  • 1. www.intercontinental-finance.comCYBER SECURITY Intercontinental Finance & Law • 146/17 READY FOR A FIGHT BACK When it comes to the issue of cyber security,the legal sector has more to worry about than most. With the frequent handling of confidential data and barristers and lawyers regularly working remotely, there are more risks to consider if firms are to ensure they remain properly protected. But doing this requires a significant financial investment, and this often comes straight out of partners’ pockets.However, payment-over-time models are set to give firms a helping hand in taking a proactive security approach. CYBER-SECURITY HAS ALWAYS BEEN A HOT TOPIC FOR BUSINESSES OF ALL SHAPES AND SIZES, but its importance has been dramatically amplified in recent months due to a spate of major attacks. The WannaCry ransomware incident – the May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency – was without doubt the most serious of the year so far, affecting computers across 99 different countries, including those belonging to the National Health Service (NHS) in the UK, Telefónica in Spain and a number of domestic banks in Russia to name but a few. Around a month later, another attack hit the UK’s parliament which left many MPs unable to access their emails, while a couple of days later the well-known Petya attack crippled numerous major firms and industries in Ukraine. These are just a small handful of the attacks that made national headlines. Chris Labrey HOW TO RETALIATE AGAINST CYBER THREATS WITH PAYMENT-OVER-TIME MODELS 20
  • 2. www.intercontinental-finance.com CYBER SECURITY 21 Chris Labrey is managing director, UK & Ireland at Econocom, a European provider of business-to-business digital services. Founded in 1974 by Jean-Louis Bouchard as Europe Computer Systèmes (ECS), the company is headquartered in Brussels, Belgium. With operations in 19 countries, it employs 10,000 people and has seven million digital assets managed. It is likely that the vast majority of these could have been prevented if the appropriate security measures were implemented in the first place, which is why cyber-security must be at the top of every businesses’ priority list, that is if it isn’t already. The truth is that no business can truly consider themselves safe from the threat of hackers and cyber criminals, and certain industries will find themselves particularly susceptible to attacks. This rings true for the legal sector, and law firms more particularly. The regular handling of highly-important and confidential information makes these firms highly- desirable targets for many malicious cyber criminals. If they are able to access the relevant systems and seize this information themselves, they can either leak it on the dark web in return for financial gain or simply use it to destroy the reputational value of the law firm in question. This is why it is imperative that all law firms are proactive in ensuring they have comprehensive cyber-security measures in place, but of course it is not always as easy as it sounds, with several potential obstacles that can slow down the journey towards a secure IT infrastructure. The biggest issue that many firms struggle with is being able to account for the significant capital expenditure that is required for truly comprehensive cyber protection. It is rare that they are able to pay these sums without facing some sort of negative financial repercussions, especially considering the fact that the money to pay for this protection is often coming directly out of the partners’ pockets. This, unsurprisingly, makes it much harder to adopt a proactive cyber security approach, despite the best intentions of firms. All hope need not be lost, however, because there is something that can help ease the strain of adopting cyber security measures for firms of all sizes – payment- over-time models. These payment-over-time models offer a 21st century solution that reflects our ‘renter society’ sensibilities, and their benefits are being realised by particularly security- conscious law firms. In the same way that many of us pay for our mobile phones, cars and home insurance in monthly instalments, the legal sector is popularising the adoption of the same model to pay for cyber security protection. The most obvious benefit of this model is that there is suddenly no longer a need for large, one-off payments in order to ensure sufficient cyber protection. Instead, the overall cost is simply divided into smaller, more manageable chunks that are then paid over a pre-determined period of time. This instantly helps to alleviate the financially- induced headaches that so many firms suffer from, allowing them to improve their cyber-security without having to put all other operations on hold. Increased flexibility is another valuable advantage of payment-over-time models. The cyber threat is continuing to evolve, with hackers devising new ways of infiltrating IT systems to devastating effect, and so law firms must be able to quickly adapt and refresh their security measures in order to stay protected in the long-term. With payment-over-time models, outdated systems can be swapped out for state-of-the- art replacements, with no need for another crippling capital expenditure investment. It’s the ideal solution for those looking to take a future-proofed approach to security. In addition, by matching the subscription term with the refresh cycle, firms reduce the risks of their existing IT systems becoming obsolete. Rolling out a comprehensive digital security project takes time, but with a dedicated facility, the costs can be warehoused so the firm only begins paying for the new system one it has been fully implemented and is live. At a time when businesses might also be paying for the support of a legacy security system during the transition period, this is a strategy that enables cash to be spent in other areas of the business in the interim. Intercontinental Finance & Law • 146/17 It is only understandable that the majority of fast-growing law firms will be sceptical about investing significant portions of their finances on IT security defences. If they find themselves having to double their number of employees over a 12-month period, for example, then the systems they would have initially invested in will likely no longer be fit for purpose. This is yet another problem that can be solved through payment-over- time models, allowing firms to scale their IT estates and security measures up or down according to business requirements at any given time. By adopting this approach, businesses can match their investment costs with benefits over time. Law firms are extremely vulnerable targets when it comes to cyber attacks, and the repercussions of suffering from a successful attack can be disastrous: the financial and reputation damage can often bring firms to their knees. This is why the legal sector cannot afford to ignore the risks that are staring them in the face – they must adopt payment-over-time models to effectively fight back. By workingwithatrustedpartnerto come up with a tailor-made model that meets each and every business require- ment, firms can guarantee c o m p r e h e n s i v e protection without any financial nightmares. l