SlideShare a Scribd company logo
1
2016 IT Disaster Recovery Planning and Preparedness Survey
Legal Firms and the Struggle
to Protect Sensitive Data
Table of Contents
Survey Objectives................................................................................................................................. 3
Survey Results................................................................................................................................... 4-10
Conclusion: Making Sense of the Data......................................................................................... 11
Key Insights................................................................................................................................... 12
Leverage IT Security and DR to Minimize Your Firm’s Risk........................................... 13
Why Firms are Turning to DRaaS........................................................................................... 14
Survey Overview
The demands of modernization in law firms have driven intense competition for innovation and service
to customers. But adopting innovations while also remaining secure from internal and external threats
have become a genuine concern.
As a leader in Disaster Recovery-as-a-Service (DRaaS), with expertise in serving law firms, Bluelock
commissioned an online reader survey with ALM (parent company of Legaltech News, Law.com,
The American Lawyer, etc.) to assess the current state of the legal industry’s IT disaster recovery (DR)
preparedness, pressures and confidence. We conducted the survey by asking legal IT professionals
(66 total respondents) in October 2016, to explore the following:
Top three challenges to firms’ operations
Respondents named “data security” (69%),
“budget” (59%) and “overburdened IT teams”
(40%) as their biggest challenges
Confidence in current DR plan Respondents were very or somewhat confident (68%)
DR testing methods
Respondents were unsure of their
testing methods or had no tests (62%)
Increasing pressure from constituents
Respondents claimed increasing pressures
from auditors (51%) and clients (42%)
Survey Results
5
Despite Top Challenges to IT Operations...
Choose the top 3 challenges your firm faces when it comes to successfully managing IT operations.
Data Security
0% 10% 20% 30% 40% 50% 60% 70%
Budget
BYOD & Personal Devices
Big Data
Datacenter Transformation
Regulatory Compliance
Client Demands for Audits & Systems Availability
Overburdened IT Teams
Other
Getting Buy-In from Managing Partners
69%
59%
40%
22%
24%
16%
26%
31%
9%
5%
★
★
★
6
The Majority of IT Pros Have Some Level
of Confidence in Disaster Recovery...
23% “very confident” | 45% “somewhat confident” | 20% “not sure” | 5% “somewhat confident” | 3% “not confident at all” | rest did not respond
Percentage of respondents
that expressed confidence
in their DR plan
68%
How confident are you that your disaster recovery (DR) plan is effective?
7
But Most Aren’t Testing Their DR Plans
32% “not sure” | 16% “we don’t have a DR plan test” | 14% “we don’t have a DR plan”
Please indicate what type(s) of DR testing you are currently using.
62%
Percentage of respondents
who claimed they didn’t test or
didn’t know what tests they did
This means the 68% who claimed
confidence in their DR plans may
be overconfident.
Given their concerns for data security,
this doesn’t bode well. If no DR tests
are being done, then firms are not
proactively identifying their
vulnerabilities. This increases the
potential risk and impact of security
incidents or an IT service disruption.
8
For those law firms conducting IT DR testing, sandbox simulations are most prevalent.
To thoroughly test disaster recovery plans and minimize risk, law firms should be initiating
sandbox simulation tests at least twice a year. When possible, full-scale testing is the most
true-to-life testing method and should be considered.
Test to Minimize Your Risk
Please indicate what type(s) of DR testing you are currently using.
10%
20%
30%
15%
25%
5%
Tabletop Tests
(Teams Review the DR Plan)
Sandbox Simulation
(Technology is Testing in Isolation,
with No Impact to Production)
Full-Scale Testing
(Full Failover and Failback Testing
of Production Environment)
0%
16%
28%
11%
9
IT Departments are Facing Increased
Pressure from Auditors and Regulators
Percentage of respondents
that claimed to face audits
and regulations regarding IT
data protection
51%
23% “strongly agree” | 28% “somewhat agree” | 27% “neither agree nor disagree” | 14% “somewhat disagree” | 8% “strongly disagree”
How strongly do you agree with the following statement: “My organization is facing increasing pressure from IT audits and regulations”?
10
Clients are Putting More Pressure
on IT Departments
42%
Percentage of respondents who claimed
clients are requesting information
about their firms’ IT operations and
data protection policies
Because law firms house large
quantities of sensitive client data,
IT departments are facing increased
scrutiny — especially those whose
law firms provide service to clients
in the banking industry.
11% “strongly agree” | 31% “somewhat agree” | 25% “neither agree nor disagree” | 13% “somewhat disagree” | 20% “strongly disagree”
How strongly do you agree with the following statement:
“More of my clients are requesting information about my firm’s IT operations and data protection policies”?
Conclusion
Making Sense of the Data
Key Insights
Success is Strained When IT Teams Lack Resources
IT professionals at legal firms are expected to be reactive to the needs of their partners.
However, stretched budgets (59%) and overburdened IT staff (40%) make it difficult to
embrace change in an era where it’s critical to mitigate risks. Because downtime can
be hugely detrimental to a firm’s reputation and livelihood, a proactive approach to DR
is essential.
In Cisco’s 2015 Annual Security Report, law firms ranked as the seventh most vulnerable business
sector to cyber attacks. Because legal proceedings often rely on sensitive client information,
hackers see an opportunity for profit and target firms for this data. No wonder 69% of respon-
dents have ranked “data security” as the biggest challenge to their firms’ IT operations.
Data Security is a Top Priority
Confidence Must Be Based On Evidence
Since data is has become a cornerstone of the modern legal practice, it’s no surprise that
regulators are taking more steps to ensure continuity and clients are requesting proof of
resiliency. Yet when 68% percent of respondents express confidence in their DR plans and
simultaneously fail to articulate their testing methods, constituents may see this disconnect as
an inability to survive in the face of crisis. 62% of firms don’t know what DR tests they perform
or have no DR tests at all, which poses a major security risk since vulnerabilities aren’t being
identified. Furthermore, it implies that their confidence in resiliency may be unfounded.
13
Leverage IT Security and DR
to Minimize Your Firm’s Risk
Information Security practices need to have direct ties to IT incident response procedures. Law firms
are increasingly turning to more modern and secure IT disaster recovery solutions to improve their
security and resiliency posture. By leveraging Disaster-Recovery-as-a-Service (DRaaS), firms are
making huge strides from existing backup-based or depreciated infrastructure to overcoming tight
budget and personnel constraints with robust data protection.
Taking steps to improve a DR strategy protects
your law firm’s reputation, client trust and –
ultimately – revenue.
“The reality is if your information
system is taken down for whatever
reason: a flood, malware, hack
attack, etc., you still have a business
continuity and disaster recovery
issue on your hands.”
- Ken Beaver, TechTarget
14
Why Law Firms are Turning to Bluelock
Legal firms are turning to Bluelock because we are dedicated to their security and empowerment.
Our Disaster Recovery-as-a-Service (DRaaS) isn’t just data protection. It’s the seamless delivery of
a digital experience, no matter the technology, so that your firm can tackle your future with certainty.
Serving as an expert extension of your IT team in handling the end-to-end responsibilities of DR
planning, testing and maintenance, Bluelock gives your IT talent the freedom to focus on other,
more pressing objectives that drive direct value to your law firm.
Worried about proof to constituents? Our client portal, Bluelock Portfolio™, offers complete visibility
with recovery metrics for even the most skeptical stakeholders, auditors or clients. Our unique
service program, Recovery Assurance™, offers verifiable evidence of recoverability and security.
For more information about Bluelock, visit bluelock.com/law.
Jumpstart your strategy by visiting our
Practical Guide to DRaaS.
www.bluelock.com | 888.402.2583 | Indianapolis · Las Vegas

More Related Content

What's hot

2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
LexisNexis Risk Solutions
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guideMarie Peters
 
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Gov BizCouncil
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
Meridian
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportTomas Imrich
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
20160210 webinarslides
20160210 webinarslides20160210 webinarslides
20160210 webinarslides
Jim Kaplan CIA CFE
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
Gov BizCouncil
 
Bringing Federal IT Up to Speed
Bringing Federal IT Up to SpeedBringing Federal IT Up to Speed
Bringing Federal IT Up to Speed
Gov BizCouncil
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
Gov BizCouncil
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
Jim Kaplan CIA CFE
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
Abhishek Sood
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
PwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographicPwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographic
PwC
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
AGILLY
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
Jake Weaver
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 

What's hot (20)

2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-ReportAccenture-2015-Global-Risk-Management-Study-Insurance-Report
Accenture-2015-Global-Risk-Management-Study-Insurance-Report
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
20160210 webinarslides
20160210 webinarslides20160210 webinarslides
20160210 webinarslides
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
 
Bringing Federal IT Up to Speed
Bringing Federal IT Up to SpeedBringing Federal IT Up to Speed
Bringing Federal IT Up to Speed
 
Creating a Federal Innovation Process
Creating a Federal Innovation ProcessCreating a Federal Innovation Process
Creating a Federal Innovation Process
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
PwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographicPwC's Unlock data possibilities - infographic
PwC's Unlock data possibilities - infographic
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 

Similar to Legal Firms and the Struggle to Protect Sensitive Data

Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
MichelleTartalio
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
RapidValue
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015
Den Reymer
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsRadhakrishnan Iyer
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
Brunswick Group
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
SolarWinds
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
Veeam Software
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Market Connections, Inc.
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalClaire Louis
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
Storyboard colocation strategy
Storyboard colocation strategyStoryboard colocation strategy
Storyboard colocation strategy
Info-Tech Research Group
 
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudSelas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudZiya NISANOGLU
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SolarWinds
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
SathishKumar960827
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCASG Community Manager
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Digital Insurer
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdf
Fiyona Nourin
 

Similar to Legal Firms and the Struggle to Protect Sensitive Data (20)

Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdfClarkston Consulting CIO - 2022 Survey Summary Report.pdf
Clarkston Consulting CIO - 2022 Survey Summary Report.pdf
 
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
Digitizing Insurance - Transforming Legacy Systems to Adopt Modern and Emergi...
 
Big Data Industry Insights 2015
Big Data Industry Insights 2015 Big Data Industry Insights 2015
Big Data Industry Insights 2015
 
Digitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue SolutionsDigitizing Insurance - A Whitepaper by RapidValue Solutions
Digitizing Insurance - A Whitepaper by RapidValue Solutions
 
2016 Global data valuation survey
2016 Global data valuation survey2016 Global data valuation survey
2016 Global data valuation survey
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016Veeam Availability Report Summary 2016
Veeam Availability Report Summary 2016
 
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
Federal Cloud Computing Report - Market Connections & General Dynamics Inform...
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Storyboard colocation strategy
Storyboard colocation strategyStoryboard colocation strategy
Storyboard colocation strategy
 
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia CloudSelas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
Selas Turkiye Cloud Computing Survey It Spending Heavily By Relia Cloud
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
ACCA Smart Finance Series - Trust in the Digital AgePresented by PwCACCA Smart Finance Series - Trust in the Digital AgePresented by PwC
ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
 
The Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdfThe Relevance of Data Analytics in External Audit.pdf
The Relevance of Data Analytics in External Audit.pdf
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Legal Firms and the Struggle to Protect Sensitive Data

  • 1. 1 2016 IT Disaster Recovery Planning and Preparedness Survey Legal Firms and the Struggle to Protect Sensitive Data
  • 2. Table of Contents Survey Objectives................................................................................................................................. 3 Survey Results................................................................................................................................... 4-10 Conclusion: Making Sense of the Data......................................................................................... 11 Key Insights................................................................................................................................... 12 Leverage IT Security and DR to Minimize Your Firm’s Risk........................................... 13 Why Firms are Turning to DRaaS........................................................................................... 14
  • 3. Survey Overview The demands of modernization in law firms have driven intense competition for innovation and service to customers. But adopting innovations while also remaining secure from internal and external threats have become a genuine concern. As a leader in Disaster Recovery-as-a-Service (DRaaS), with expertise in serving law firms, Bluelock commissioned an online reader survey with ALM (parent company of Legaltech News, Law.com, The American Lawyer, etc.) to assess the current state of the legal industry’s IT disaster recovery (DR) preparedness, pressures and confidence. We conducted the survey by asking legal IT professionals (66 total respondents) in October 2016, to explore the following: Top three challenges to firms’ operations Respondents named “data security” (69%), “budget” (59%) and “overburdened IT teams” (40%) as their biggest challenges Confidence in current DR plan Respondents were very or somewhat confident (68%) DR testing methods Respondents were unsure of their testing methods or had no tests (62%) Increasing pressure from constituents Respondents claimed increasing pressures from auditors (51%) and clients (42%)
  • 5. 5 Despite Top Challenges to IT Operations... Choose the top 3 challenges your firm faces when it comes to successfully managing IT operations. Data Security 0% 10% 20% 30% 40% 50% 60% 70% Budget BYOD & Personal Devices Big Data Datacenter Transformation Regulatory Compliance Client Demands for Audits & Systems Availability Overburdened IT Teams Other Getting Buy-In from Managing Partners 69% 59% 40% 22% 24% 16% 26% 31% 9% 5% ★ ★ ★
  • 6. 6 The Majority of IT Pros Have Some Level of Confidence in Disaster Recovery... 23% “very confident” | 45% “somewhat confident” | 20% “not sure” | 5% “somewhat confident” | 3% “not confident at all” | rest did not respond Percentage of respondents that expressed confidence in their DR plan 68% How confident are you that your disaster recovery (DR) plan is effective?
  • 7. 7 But Most Aren’t Testing Their DR Plans 32% “not sure” | 16% “we don’t have a DR plan test” | 14% “we don’t have a DR plan” Please indicate what type(s) of DR testing you are currently using. 62% Percentage of respondents who claimed they didn’t test or didn’t know what tests they did This means the 68% who claimed confidence in their DR plans may be overconfident. Given their concerns for data security, this doesn’t bode well. If no DR tests are being done, then firms are not proactively identifying their vulnerabilities. This increases the potential risk and impact of security incidents or an IT service disruption.
  • 8. 8 For those law firms conducting IT DR testing, sandbox simulations are most prevalent. To thoroughly test disaster recovery plans and minimize risk, law firms should be initiating sandbox simulation tests at least twice a year. When possible, full-scale testing is the most true-to-life testing method and should be considered. Test to Minimize Your Risk Please indicate what type(s) of DR testing you are currently using. 10% 20% 30% 15% 25% 5% Tabletop Tests (Teams Review the DR Plan) Sandbox Simulation (Technology is Testing in Isolation, with No Impact to Production) Full-Scale Testing (Full Failover and Failback Testing of Production Environment) 0% 16% 28% 11%
  • 9. 9 IT Departments are Facing Increased Pressure from Auditors and Regulators Percentage of respondents that claimed to face audits and regulations regarding IT data protection 51% 23% “strongly agree” | 28% “somewhat agree” | 27% “neither agree nor disagree” | 14% “somewhat disagree” | 8% “strongly disagree” How strongly do you agree with the following statement: “My organization is facing increasing pressure from IT audits and regulations”?
  • 10. 10 Clients are Putting More Pressure on IT Departments 42% Percentage of respondents who claimed clients are requesting information about their firms’ IT operations and data protection policies Because law firms house large quantities of sensitive client data, IT departments are facing increased scrutiny — especially those whose law firms provide service to clients in the banking industry. 11% “strongly agree” | 31% “somewhat agree” | 25% “neither agree nor disagree” | 13% “somewhat disagree” | 20% “strongly disagree” How strongly do you agree with the following statement: “More of my clients are requesting information about my firm’s IT operations and data protection policies”?
  • 12. Key Insights Success is Strained When IT Teams Lack Resources IT professionals at legal firms are expected to be reactive to the needs of their partners. However, stretched budgets (59%) and overburdened IT staff (40%) make it difficult to embrace change in an era where it’s critical to mitigate risks. Because downtime can be hugely detrimental to a firm’s reputation and livelihood, a proactive approach to DR is essential. In Cisco’s 2015 Annual Security Report, law firms ranked as the seventh most vulnerable business sector to cyber attacks. Because legal proceedings often rely on sensitive client information, hackers see an opportunity for profit and target firms for this data. No wonder 69% of respon- dents have ranked “data security” as the biggest challenge to their firms’ IT operations. Data Security is a Top Priority Confidence Must Be Based On Evidence Since data is has become a cornerstone of the modern legal practice, it’s no surprise that regulators are taking more steps to ensure continuity and clients are requesting proof of resiliency. Yet when 68% percent of respondents express confidence in their DR plans and simultaneously fail to articulate their testing methods, constituents may see this disconnect as an inability to survive in the face of crisis. 62% of firms don’t know what DR tests they perform or have no DR tests at all, which poses a major security risk since vulnerabilities aren’t being identified. Furthermore, it implies that their confidence in resiliency may be unfounded.
  • 13. 13 Leverage IT Security and DR to Minimize Your Firm’s Risk Information Security practices need to have direct ties to IT incident response procedures. Law firms are increasingly turning to more modern and secure IT disaster recovery solutions to improve their security and resiliency posture. By leveraging Disaster-Recovery-as-a-Service (DRaaS), firms are making huge strides from existing backup-based or depreciated infrastructure to overcoming tight budget and personnel constraints with robust data protection. Taking steps to improve a DR strategy protects your law firm’s reputation, client trust and – ultimately – revenue. “The reality is if your information system is taken down for whatever reason: a flood, malware, hack attack, etc., you still have a business continuity and disaster recovery issue on your hands.” - Ken Beaver, TechTarget
  • 14. 14 Why Law Firms are Turning to Bluelock Legal firms are turning to Bluelock because we are dedicated to their security and empowerment. Our Disaster Recovery-as-a-Service (DRaaS) isn’t just data protection. It’s the seamless delivery of a digital experience, no matter the technology, so that your firm can tackle your future with certainty. Serving as an expert extension of your IT team in handling the end-to-end responsibilities of DR planning, testing and maintenance, Bluelock gives your IT talent the freedom to focus on other, more pressing objectives that drive direct value to your law firm. Worried about proof to constituents? Our client portal, Bluelock Portfolio™, offers complete visibility with recovery metrics for even the most skeptical stakeholders, auditors or clients. Our unique service program, Recovery Assurance™, offers verifiable evidence of recoverability and security. For more information about Bluelock, visit bluelock.com/law.
  • 15. Jumpstart your strategy by visiting our Practical Guide to DRaaS. www.bluelock.com | 888.402.2583 | Indianapolis · Las Vegas