SlideShare a Scribd company logo
LAW FIRM
CYBERSECURITY
PRACTICAL TIPS FOR PROTECTING YOUR DATA
In February, 2013, the FBI gave a keynote presentation on law firm
security threats at LegalTech New York. In an article from Law
Technology News, the special agent in charge of the FBI’s cyber
operations in New York City is quoted as stating:
“We have hundreds of law firms that we see increasingly
being targeted by hackers. …We all understand that the
cyber threat is our next great challenge. Cyber intrusions are
all over the place, they’re dangerous, and they’re much more
sophisticated” than they were just a few years ago.”
WHY ARE LAW
FIRMS AT RISK?
REASONS LAW FIRMS
REPRESENT A CYBER TARGET:
• Many firms regularly maintain a tremendous amount of highly
confidential information and information is the currency that cyber
criminals trade in.
• You may not be the primary target. Many attacks are of the
command and control variety where the objective is to use your
environment as a beachhead for a secondary attack.
• Cyber criminals may be targeting YOUR CLIENT or ANOTHER FIRM
and realize that you represent the means to get passed their
existing infrastructure.
• As an industry, we make for a very easy target.
The measures in place for many firms are very far behind those in
other industries.
But its not just about spending money. The Goldman Sachs data
breach resulted in the discloser of 70+ million users accounts and
over 7 million business accounts. Goldman Sachs spend over $250
million dollars A YEAR in cyber defense.
It’s about the focus security gets all the way down to the end users.
End users are the single weakest point in any network.
LEGAL
INDUSTRY
CYBER
THREATS,
RISKS AND
ATTACKS
• For two straight years, more than two thirds of Cyber Espionage
has featured Phishing as its primary means of attack
• According to the Verizon 2015 DBIR, in 2014, users opened
approximately 23% of inbound Phishing messages and 11%
clicked on attachments.
• Historically, Phishing has been the means to target individuals and
not businesses. This however is also changing dramatically.
• Enter “The Dyre Wolf”. This is a new campaign that utilizes the
now popular Dyre, or Dyreza, malware directly targeting corporate
banking accounts
• This phishing and malware campaign leverages spear phishing,
malware (initial infection via Upatre), social engineering, complex
process injections, the Deep Web and even Distributed Denial of
Service (DDoS) sprees to complete an attack Dyre wolf is a perfect
example of how most defenses are still only as safe is the weakest
employee.
PHISHING / SOCIAL
ENGINEERING ATTACKS
THE DYRE WOLF ATTACK
• Not your typical malware campaign
• Each attack cost companies $500,000 -
$1.5 million
• Uses targeted spear phishing emails,
malware and social engineering
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Photo credit: IBM, 2015
THE DYRE WOLF ATTACK
Dyre wolf is a perfect example of how most
defenses are still only as safe is the weakest
employee.
Defending against Phishing attacks are largely
centered on knowledge and training of the
weakest link in your system – end users.
ACCIDENTS (AGAIN…USERS)
• Accidental disclosure of confidential information is a substantial
reason for a data breaches with over 60% being initiated by system
administrators.
 Read “Biggest Cyber Security Threat to Law Firms is Not What You Think”
• Types of accidents often break down into 3 primary categories:
1) “D’oh!”: ever sent an email to a client and about .0009 seconds after
hitting the send button, you realize you’ve sent information to the wrong
recipient? DBIR reports this as being the single largest exposure point
for data
2) “My Bad!”: According to the same DBIR reports, about 17% of the
breach / disclosures are the result of users publishing nonpublic data to
public servers. Sensitive client data does not belong on the Google!
3) “Oops!”: The last bucket of end user snafu’s is the insecure disposal of
personal and medical data.
VULNERABILITIES…
(WE DON’T NEED NO STINKIN’ PATCHES)
• CVE’s, or common vulnerabilities and exposures, is a worldwide
list of known system vulnerabilities that is published to any and all
who want to use it.
• Most companies performing vulnerability scans are leveraging this
list to test a network for known weaknesses. Software and OS
updates are leveraging this list to build fixes to vulnerabilities as
fast as they are identified.
• Which brings up an interesting point – the vast majority of
breaches in 2014 were initiated through known CVE’s that were at
least a year old. AT LEAST A YEAR OLD!
• 97% of the known exploits were created with 10 CVE’s – ONLY 10!
• But before you ask – the remaining exploits were created with 7
MILLION CVE’s. So you cannot simply look for the top 10 and call
it a day.
THE LONG-CON
• Ransomware has traditionally acted as a zero day attack;
however, those same criminals are finding that a long, slow
attack can yield even higher returns.
• The next phase of ransom are will likely sit in an
environment for months before initiating action
• Possible scenarios now include server side attacks that can
encrypt data moving to and from the server until the
criminal feels they have sufficient amounts of data
encrypted
• They simply hold your and your data hostage in return for
payment
• No payment means they remove the encryption key and
none of your systems will work until you do
THE INTERNET OF THINGS & BYOD
(IT’S ONLY GOING TO GET MORE DIFFICULT…)
• Dramatic increase in the number of internet connected
devices that could lead to accidently exposure of
confidential information.
• Target proved this in spades
• As you look at your environment from a security perspective,
have you considered everything?
• Traditional unmonitored vectors include fax machines and
printers but, have you checked that new TV in the
conference room?
• What about that new iWatch?
GETTING IN FRONT
OF THE PROBLEM.
• First things first - the firm, its partners and directors, all must
agree that security is a priority.
– First it needs to be a priority from the top down if the end users
are to adjust their daily behavior to marry to security policies of
the firm.
– The senior most people in any organization are typically the
least likely to be willing to adjust their behavior!
• Any investments needed to properly build and maintain a security
plan will require the people at the top to spend out of their own
pocket.
• Must be a permanent part of the business plan
GETTING IN FRONT OF THE
PROBLEM
STEP 1: PUT SOMEONE IN
CHARGE OF CYBERSECURITY
• Many organizations set a course for failure almost from the start
by not establishing responsibility for one person or a team of
people to manage this process.
• Must also be responsible for moving the firm from compliance to
security. These two are not the same thing.
• Even an ISO27001 certified firm may not be secure – they simply
have the policies and procedures in place for an effective security
program
STEP 2: HAVE SOMETHING
FOR THEM TO ENFORCE
• Every firm should employ some form of a written security plan
• There are 4 core controls within to a proper plan – Physical, Policy,
Detective and Corrective
• Key elements for a law firm security plan include:
– Identification - Identify the data your firm maintains, establish its
location and identify which information is most sensitive and in need of
monitoring.
– Encryption - Whether at rest or in transit, data should always be
encrypted.
– Remote Access / Authentication - What information will you allow access
to from outside the building?
– Password Policies - Will you be willing and able to implement a complex
password policy that changes every 90 days?
– Social Media Policy - Use at work? Can you use the same log in for
Facebook as you can for your company PC?
STEP 2: HAVE SOMETHING FOR
THEM TO ENFORCE (CONT.)
• Key elements for a law firm security plan (con’t)
– Physical Security - Are you planning to restrict building access? Can
you track when people come and go? Are there cameras to track
access to critical information?
– Vendor Security - No one likes to do it but auditing your 3rd party
vendors can be a critical piece to your security plan.
– Breach Response Planning - Each plan should contain critical pieces
such as client notification plans, plan for notifying authorities,
documentation plans, and overall decision-making ability.
STEP 3: CREATE & MAINTAIN A PROPER
DEFENSE / MONITORING ENVIRONMENT
• Firewall with IDS or IPS - A firewall with intrusion detection (IDS) or intrusion
prevention (IPS) is recommended for maximum protection against malicious traffic.
• Spam Filter – The majority of viruses that get into networks are from email phishing
attempts.
• Patching - The greatest source of vulnerability comes from using software and
application that are not properly patched (i.e. they lack the latest updates).
• Mobile Device Management – Allows you to manage, secure and monitor your firm’s
mobile devices in real time.
• Encryption – Any device that can store sensitive information (i.e. phones, laptops,
tablets) and is built to leave the building should be encrypted.
• White Listing Systems – For advanced defensive environments. This system keeps
anything that you do not designate from being installed anywhere on your network.
• Logging Systems - Understanding where your data resides AND being able to
establish patterns of users traffic can go a long way to knowing
when something has gone wrong and you’ve been breached.
Read: 5 Basic
Cybersecurity Controls
Every Firm MUST Have
in Place
STEP 4: FORM A MILITIA
• Create a security policy and turn your employees into your cyber
militia
• Employees represent one of your greatest defense opportunities,
but they need to understand the importance of protecting your
confidential data and the rules for keeping it safe.
• Training - Over 23% of people open phishing messages and 11%
click on attachments
• Enforcement - It’s up to management to ensure that the policies
and procedures are being followed
– Look to test users with false phishing emails to see who opens them
– Focus training on the types of campaigns that were most successful in
your company
STEP 5: CONTINUAL MONITORING
AND IMPROVEMENT
• Continual assessment and validation is necessary to verify the
effectiveness of your security efforts.
– Many attacks happen from exploiting weaknesses in browsers, web
applications, malicious websites, and other applications.
– Vulnerability Scanning is the most a cost-effective way to protect your
environment from unpatched exploits, new threats and hackers.
• Penetration Testing - A penetration test provides a point-in-time
snapshot of security gaps and should be done regularly to
determine system vulnerabilities.
• Security Assessment - Have a qualified third party review your
network and identify potential business implications of security
threats and how they can be remediated to improve compliance
and longevity.
ADDITIONAL RESOURCES
• 5 Basic Cybersecurity Controls Every Firm MUST Have in Place
• My firm has been hacked, what do I do?
• Which type of hackers represent the biggest threat to law firms?
• Law Firm Cyber Security Threat Matrix [eBook]
• Should Firms Restrict Access to Personal Email?
• Law Firm Cyber Security: Protecting Your Client’s Data
• What your Law Firm Needs to Know About IT Risk and Security
Audits
For further reading, visit our blog Legal Loudspeaker.
Discover how Accellis can help you
stay in front of cybersecurity threats.
Whether it’s a security assessment, penetration test, or
compliance evaluation – our team of certified security
experts can ensure you’re on the right track.
SCHEDULE A FREE
CONSULTATION
Schedule a Consultation

More Related Content

What's hot

Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
Community IT Innovators
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Arun Kannoth
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ade Ismail Isnan
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
Daniel Thomas
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
GTreasury
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
Don Gulling
 

What's hot (20)

Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 

Similar to Law Firm Cybersecurity: Practical Tips for Protecting Your Data

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
Precisely
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 

Similar to Law Firm Cybersecurity: Practical Tips for Protecting Your Data (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Law Firm Cybersecurity: Practical Tips for Protecting Your Data

  • 1. LAW FIRM CYBERSECURITY PRACTICAL TIPS FOR PROTECTING YOUR DATA
  • 2. In February, 2013, the FBI gave a keynote presentation on law firm security threats at LegalTech New York. In an article from Law Technology News, the special agent in charge of the FBI’s cyber operations in New York City is quoted as stating: “We have hundreds of law firms that we see increasingly being targeted by hackers. …We all understand that the cyber threat is our next great challenge. Cyber intrusions are all over the place, they’re dangerous, and they’re much more sophisticated” than they were just a few years ago.”
  • 3. WHY ARE LAW FIRMS AT RISK?
  • 4. REASONS LAW FIRMS REPRESENT A CYBER TARGET: • Many firms regularly maintain a tremendous amount of highly confidential information and information is the currency that cyber criminals trade in. • You may not be the primary target. Many attacks are of the command and control variety where the objective is to use your environment as a beachhead for a secondary attack. • Cyber criminals may be targeting YOUR CLIENT or ANOTHER FIRM and realize that you represent the means to get passed their existing infrastructure. • As an industry, we make for a very easy target.
  • 5. The measures in place for many firms are very far behind those in other industries. But its not just about spending money. The Goldman Sachs data breach resulted in the discloser of 70+ million users accounts and over 7 million business accounts. Goldman Sachs spend over $250 million dollars A YEAR in cyber defense. It’s about the focus security gets all the way down to the end users. End users are the single weakest point in any network.
  • 7. • For two straight years, more than two thirds of Cyber Espionage has featured Phishing as its primary means of attack • According to the Verizon 2015 DBIR, in 2014, users opened approximately 23% of inbound Phishing messages and 11% clicked on attachments. • Historically, Phishing has been the means to target individuals and not businesses. This however is also changing dramatically. • Enter “The Dyre Wolf”. This is a new campaign that utilizes the now popular Dyre, or Dyreza, malware directly targeting corporate banking accounts • This phishing and malware campaign leverages spear phishing, malware (initial infection via Upatre), social engineering, complex process injections, the Deep Web and even Distributed Denial of Service (DDoS) sprees to complete an attack Dyre wolf is a perfect example of how most defenses are still only as safe is the weakest employee. PHISHING / SOCIAL ENGINEERING ATTACKS
  • 8. THE DYRE WOLF ATTACK • Not your typical malware campaign • Each attack cost companies $500,000 - $1.5 million • Uses targeted spear phishing emails, malware and social engineering
  • 9. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 10. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 11. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 12. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 13. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 14. THE DYRE WOLF ATTACK Photo credit: IBM, 2015
  • 15. THE DYRE WOLF ATTACK
  • 16. Dyre wolf is a perfect example of how most defenses are still only as safe is the weakest employee. Defending against Phishing attacks are largely centered on knowledge and training of the weakest link in your system – end users.
  • 17. ACCIDENTS (AGAIN…USERS) • Accidental disclosure of confidential information is a substantial reason for a data breaches with over 60% being initiated by system administrators.  Read “Biggest Cyber Security Threat to Law Firms is Not What You Think” • Types of accidents often break down into 3 primary categories: 1) “D’oh!”: ever sent an email to a client and about .0009 seconds after hitting the send button, you realize you’ve sent information to the wrong recipient? DBIR reports this as being the single largest exposure point for data 2) “My Bad!”: According to the same DBIR reports, about 17% of the breach / disclosures are the result of users publishing nonpublic data to public servers. Sensitive client data does not belong on the Google! 3) “Oops!”: The last bucket of end user snafu’s is the insecure disposal of personal and medical data.
  • 18. VULNERABILITIES… (WE DON’T NEED NO STINKIN’ PATCHES) • CVE’s, or common vulnerabilities and exposures, is a worldwide list of known system vulnerabilities that is published to any and all who want to use it. • Most companies performing vulnerability scans are leveraging this list to test a network for known weaknesses. Software and OS updates are leveraging this list to build fixes to vulnerabilities as fast as they are identified. • Which brings up an interesting point – the vast majority of breaches in 2014 were initiated through known CVE’s that were at least a year old. AT LEAST A YEAR OLD! • 97% of the known exploits were created with 10 CVE’s – ONLY 10! • But before you ask – the remaining exploits were created with 7 MILLION CVE’s. So you cannot simply look for the top 10 and call it a day.
  • 19. THE LONG-CON • Ransomware has traditionally acted as a zero day attack; however, those same criminals are finding that a long, slow attack can yield even higher returns. • The next phase of ransom are will likely sit in an environment for months before initiating action • Possible scenarios now include server side attacks that can encrypt data moving to and from the server until the criminal feels they have sufficient amounts of data encrypted • They simply hold your and your data hostage in return for payment • No payment means they remove the encryption key and none of your systems will work until you do
  • 20. THE INTERNET OF THINGS & BYOD (IT’S ONLY GOING TO GET MORE DIFFICULT…) • Dramatic increase in the number of internet connected devices that could lead to accidently exposure of confidential information. • Target proved this in spades • As you look at your environment from a security perspective, have you considered everything? • Traditional unmonitored vectors include fax machines and printers but, have you checked that new TV in the conference room? • What about that new iWatch?
  • 21. GETTING IN FRONT OF THE PROBLEM.
  • 22. • First things first - the firm, its partners and directors, all must agree that security is a priority. – First it needs to be a priority from the top down if the end users are to adjust their daily behavior to marry to security policies of the firm. – The senior most people in any organization are typically the least likely to be willing to adjust their behavior! • Any investments needed to properly build and maintain a security plan will require the people at the top to spend out of their own pocket. • Must be a permanent part of the business plan GETTING IN FRONT OF THE PROBLEM
  • 23. STEP 1: PUT SOMEONE IN CHARGE OF CYBERSECURITY • Many organizations set a course for failure almost from the start by not establishing responsibility for one person or a team of people to manage this process. • Must also be responsible for moving the firm from compliance to security. These two are not the same thing. • Even an ISO27001 certified firm may not be secure – they simply have the policies and procedures in place for an effective security program
  • 24. STEP 2: HAVE SOMETHING FOR THEM TO ENFORCE • Every firm should employ some form of a written security plan • There are 4 core controls within to a proper plan – Physical, Policy, Detective and Corrective • Key elements for a law firm security plan include: – Identification - Identify the data your firm maintains, establish its location and identify which information is most sensitive and in need of monitoring. – Encryption - Whether at rest or in transit, data should always be encrypted. – Remote Access / Authentication - What information will you allow access to from outside the building? – Password Policies - Will you be willing and able to implement a complex password policy that changes every 90 days? – Social Media Policy - Use at work? Can you use the same log in for Facebook as you can for your company PC?
  • 25. STEP 2: HAVE SOMETHING FOR THEM TO ENFORCE (CONT.) • Key elements for a law firm security plan (con’t) – Physical Security - Are you planning to restrict building access? Can you track when people come and go? Are there cameras to track access to critical information? – Vendor Security - No one likes to do it but auditing your 3rd party vendors can be a critical piece to your security plan. – Breach Response Planning - Each plan should contain critical pieces such as client notification plans, plan for notifying authorities, documentation plans, and overall decision-making ability.
  • 26. STEP 3: CREATE & MAINTAIN A PROPER DEFENSE / MONITORING ENVIRONMENT • Firewall with IDS or IPS - A firewall with intrusion detection (IDS) or intrusion prevention (IPS) is recommended for maximum protection against malicious traffic. • Spam Filter – The majority of viruses that get into networks are from email phishing attempts. • Patching - The greatest source of vulnerability comes from using software and application that are not properly patched (i.e. they lack the latest updates). • Mobile Device Management – Allows you to manage, secure and monitor your firm’s mobile devices in real time. • Encryption – Any device that can store sensitive information (i.e. phones, laptops, tablets) and is built to leave the building should be encrypted. • White Listing Systems – For advanced defensive environments. This system keeps anything that you do not designate from being installed anywhere on your network. • Logging Systems - Understanding where your data resides AND being able to establish patterns of users traffic can go a long way to knowing when something has gone wrong and you’ve been breached. Read: 5 Basic Cybersecurity Controls Every Firm MUST Have in Place
  • 27. STEP 4: FORM A MILITIA • Create a security policy and turn your employees into your cyber militia • Employees represent one of your greatest defense opportunities, but they need to understand the importance of protecting your confidential data and the rules for keeping it safe. • Training - Over 23% of people open phishing messages and 11% click on attachments • Enforcement - It’s up to management to ensure that the policies and procedures are being followed – Look to test users with false phishing emails to see who opens them – Focus training on the types of campaigns that were most successful in your company
  • 28. STEP 5: CONTINUAL MONITORING AND IMPROVEMENT • Continual assessment and validation is necessary to verify the effectiveness of your security efforts. – Many attacks happen from exploiting weaknesses in browsers, web applications, malicious websites, and other applications. – Vulnerability Scanning is the most a cost-effective way to protect your environment from unpatched exploits, new threats and hackers. • Penetration Testing - A penetration test provides a point-in-time snapshot of security gaps and should be done regularly to determine system vulnerabilities. • Security Assessment - Have a qualified third party review your network and identify potential business implications of security threats and how they can be remediated to improve compliance and longevity.
  • 29. ADDITIONAL RESOURCES • 5 Basic Cybersecurity Controls Every Firm MUST Have in Place • My firm has been hacked, what do I do? • Which type of hackers represent the biggest threat to law firms? • Law Firm Cyber Security Threat Matrix [eBook] • Should Firms Restrict Access to Personal Email? • Law Firm Cyber Security: Protecting Your Client’s Data • What your Law Firm Needs to Know About IT Risk and Security Audits For further reading, visit our blog Legal Loudspeaker.
  • 30. Discover how Accellis can help you stay in front of cybersecurity threats. Whether it’s a security assessment, penetration test, or compliance evaluation – our team of certified security experts can ensure you’re on the right track. SCHEDULE A FREE CONSULTATION Schedule a Consultation