SlideShare a Scribd company logo
1 of 4
Download to read offline
Hacker Defense: How to Make Your Law Firm
a Harder Target
A LexisNexis® White Paper
Highlights

Choose Strong Passwords

•	

Criminals and state-sponsored attackers are targeting intellectual
property, client information and avenues for business disruption.

•	

It is up to law firms, which are attractive targets for hackers, to protect
both themselves and their clients with security measures that keep up
with increasing risk.

•	

IT security policy needs to intelligently define who has access to
which resources, and clearly outline and enforce the consequences
of violations.

Even though hackers can now employ powerful software to try to crack
computer passwords, many times they don’t need to; they can simply guess.
That’s because even in our high-tech world, most people still choose lousy
passwords. For years, “password” has been far and away the most popular
choice,3 with “123456” holding a close second in rankings. Even lawyers can’t
feel too superior to the average person: in 2012, for example, a large law firm
was hacked, partly due to its password policy in which login credentials were
simply “law321”,4 preceded by the user’s initials. That’s not much better.
To get an idea of how tough your password is, it’s worth testing it.5

•	

Other best practices include using strong passwords that are changed
on a regular schedule.

•	

To further keep the trust of clients and colleagues, legal professionals
should be particularly wary of potentially compromising email
attachments and other material received from unfamiliar or
untested sources.

Introduction
In security, you are only as strong as your weakest link. A 2012 report of an
FBI investigation1 suggested that a company’s weakest link might be its law
firm. Every law firm keeps valuable and sensitive information on each of its
clients—information that hackers would love to obtain. And that makes the
firm an attractive target.2
It is up to law firms to protect both themselves and their clients with security
measures that keep up with increasing risk. The firm can’t risk losing the trust
of its clients. Here are some important ways that individual lawyers, and their
firms, can improve the security of the information entrusted to them.

Hacker Defense: How to Make Your Law Firm a Harder Target

Change Passwords on a Schedule
It is also much harder for hackers to hit a moving target. Even if your IT
department doesn’t require it, you should change your password regularly. Set
yourself a reminder every 90 days or so and stick to a schedule. It may seem
like a lot of work for a seemingly invisible reward, but the stakes involved make
it too important to skip. Choose strong passwords and change them regularly
for the same reason you go to the dentist or get the oil changed in your car: the
hassle is well worth it to help prevent the potential long-term downside.

Be a Healthy Skeptic
Thanks to popular movies, many people imagine that hacking goes on
invisibly, with guys in basements directly accessing top-secret databases,
typing in lines and lines of code. In reality, hacking computers is very hard. It is
much easier to hack people. Often, a hacker exploit looks more like this: you
receive an email from what seems to be a new colleague at your client’s
office. Attached in the email is a link to a document. You click on the link, and
perhaps you read the document. Later, you find out your client files have
been compromised and your firm’s name is in the news. That’s how hackers
have operated internationally in recent years and duped employees of
several law firms6 to compromise their own security.
As a legal professional, and as someone who has the access to information
that a hacker would love to have, it’s up to you to be an extreme skeptic. Discs,
drives, emails and even documents from established as well as unknown
sources should all have to prove themselves before you do anything with
them. Technology changes so fast, it’s almost impossible to tell how a hacker’s
exploit might arrive. As a result, it’s up to you to look at what you can find out:
what’s the source, have you seen it before and is it vetted in some way? If you
aren’t sure, report it to your IT department ASAP. That goes for unexpected
phone calls too.

Stay on a “Need to Know” Basis
The IT department that won’t give you access to something may actually be
doing you a favor. First of all, the fewer people have access to an asset, the
safer that asset is. High-risk assets, and the people with access to them, need
to be watched more closely. That can mean more oversight and procedure,
which might slow you down.

Law Firms Need to Keep the Trust of their Clients
Law firms need to stay sharp because corporate security is getting harder,
not easier. At the same time, companies are starting to recognize7 that
information security is a fundamental business issue—one that demands an
increased focus on cyber resilience, not just security. The reason is simple:
criminals and state-sponsored attackers are targeting intellectual property,
customer information, and avenues for business disruption. That makes law
firms an ideal target. With increased threats, clients will be more careful about
choosing partners that they can trust. The solution can’t rely only on user
behavior. People will continue to choose their pets’ names as passwords, and
none of those names will be something really secure like “C”^S=K~=y-”5(ss”.
In response, law firm partners and their IT departments need to leverage
technologies and create policies that protect themselves and their clients.
Security policy needs to intelligently define who has access to which
resources, and clearly outline and enforce the consequences of violating
that policy. It also needs to protect from both the inside and the outside,
with strong network security, usage monitoring, intrusion detection and
sophisticated reporting.

Hacker Defense: How to Make Your Law Firm a Harder Target
The Solution for Legal Professionals
LexisNexis® Public Records, with its unparalleled search, analytics and
reporting technologies, can uncover hidden connections—even when entities
don’t have a record in common—and raise red flags to help you improve your
due diligence efforts.
To learn how you can locate and get a more complete picture of people
and businesses across the U.S., visit www.lexisnexis.com/publicrecords.
For more topics that are transforming the legal industry,
visit www.thisisreallaw.com.

This document is for educational purposes only and does not guarantee the functionality or features of LexisNexis® products identified. LexisNexis does not
warrant this document is complete or error-free. If written by a third party, the opinions may not represent the opinions of LexisNexis.
1	

Lynne Ahearn, “FBI’s look at electronic espionage uncovers
law firms lack of data security,” WGA InsureBlog, March 22,
2012, http://blog.wgains.com/2012/03/22/fbis-look-at-electronicespionage-uncovers-law-firms-lack-of-data-security/.

3	

Erica Ho, “The 25 Most Popular (and Worst) Passwords
of 2011,” Time, November 22, 2011, http://techland.time.
com/2011/11/22/the-25-most-popular-and-worst-passwords-of2011/#ixzz2n0xWNIyl.

2	

Jennifer Smith, “Lawyers Get Vigilant on Cybersecurity,” The
Wall Street Journal, June 26, 2012, http://online.wsj.com/news/
articles/SB10001424052702304458604577486761101726748.

4	

Elinor Mills, “Hackers vow ‘hellfire’ in latest major data leak,”
C|Net, August 28, 2012, http://news.cnet.com/8301-1009_357501931-83/hackers-vow-hellfire-in-latest-major-data-leak/.

5	

Microsoft, Safety & Security Center, https://www.microsoft.com/
security/pc-security/password-checker.aspx.

6	

Mike Mintz, “Cyberattacks on Law Firms – a Growing Threat,”
Martindale.com Blog, March 19, 2012, http://blog.martindale.
com/cyberattacks-on-law-firms-a-growing-threat.

7	

Deloitte, “Technology, Media & Telecommunications Firms
Boost Cyber Resiliency via Strategic Security Initiatives,
Alliances and Training,” January 18, 2013, http://www.deloitte.
com/view/en_US/us/press/Press-Releases/259bed453824c310
VgnVCM2000003356f70aRCRD.htm.

LexisNexis, martindale.com and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Other products or services may be trademarks or registered trademarks of their respective companies. © 2014
LexisNexis. All rights reserved. BMH00414-0

More Related Content

What's hot

E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsDavid X Martin
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupAccellis Technology Group
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseShawn Tuma
 
Active Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jActive Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jNeo4j
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachTeri Radichel
 

What's hot (20)

Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directors
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Hacker Hunters Case Study
Hacker Hunters Case StudyHacker Hunters Case Study
Hacker Hunters Case Study
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Cyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach ResponseCyber Liability Insurance Counseling and Breach Response
Cyber Liability Insurance Counseling and Breach Response
 
Active Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jActive Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4j
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 

Similar to Hacker Defense: How to Make Your Law Firm a Harder Target

Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
4 ways to stop the unauthorized sharing of the research reports within the i...
 4 ways to stop the unauthorized sharing of the research reports within the i... 4 ways to stop the unauthorized sharing of the research reports within the i...
4 ways to stop the unauthorized sharing of the research reports within the i...Ameva Tech
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 

Similar to Hacker Defense: How to Make Your Law Firm a Harder Target (20)

Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
4 ways to stop the unauthorized sharing of the research reports within the i...
 4 ways to stop the unauthorized sharing of the research reports within the i... 4 ways to stop the unauthorized sharing of the research reports within the i...
4 ways to stop the unauthorized sharing of the research reports within the i...
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 

More from LexisNexis

2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdfLexisNexis
 
2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdfLexisNexis
 
2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdfLexisNexis
 
2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdfLexisNexis
 
2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdfLexisNexis
 
2021 Washington State catalog
2021 Washington State catalog2021 Washington State catalog
2021 Washington State catalogLexisNexis
 
2021 Southwest Product Listing
2021 Southwest Product Listing2021 Southwest Product Listing
2021 Southwest Product ListingLexisNexis
 
2021 Southeastern States Product Listing
2021 Southeastern States Product Listing2021 Southeastern States Product Listing
2021 Southeastern States Product ListingLexisNexis
 
2021 Ohio Product Listing
2021 Ohio Product Listing2021 Ohio Product Listing
2021 Ohio Product ListingLexisNexis
 
2021 Illinois Product Listing
2021 Illinois Product Listing2021 Illinois Product Listing
2021 Illinois Product ListingLexisNexis
 
2021 Florida Product Listing
2021 Florida Product Listing2021 Florida Product Listing
2021 Florida Product ListingLexisNexis
 
2021 Estate Planning Catalog
2021 Estate Planning Catalog2021 Estate Planning Catalog
2021 Estate Planning CatalogLexisNexis
 
2021 California Product Listing
2021 California Product Listing2021 California Product Listing
2021 California Product ListingLexisNexis
 
2021 Workers Compensation product listing
2021 Workers Compensation product listing2021 Workers Compensation product listing
2021 Workers Compensation product listingLexisNexis
 
2020 New England Product Listing
2020 New England Product Listing2020 New England Product Listing
2020 New England Product ListingLexisNexis
 
Voss on Delaware Contract Law
Voss on Delaware Contract LawVoss on Delaware Contract Law
Voss on Delaware Contract LawLexisNexis
 
Be Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisBe Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisLexisNexis
 
Legal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLegal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLexisNexis
 
Real Estate Product Listing
Real Estate Product ListingReal Estate Product Listing
Real Estate Product ListingLexisNexis
 
AHLA Catalog 2019
AHLA Catalog 2019AHLA Catalog 2019
AHLA Catalog 2019LexisNexis
 

More from LexisNexis (20)

2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf
 
2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf
 
2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf
 
2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf
 
2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf
 
2021 Washington State catalog
2021 Washington State catalog2021 Washington State catalog
2021 Washington State catalog
 
2021 Southwest Product Listing
2021 Southwest Product Listing2021 Southwest Product Listing
2021 Southwest Product Listing
 
2021 Southeastern States Product Listing
2021 Southeastern States Product Listing2021 Southeastern States Product Listing
2021 Southeastern States Product Listing
 
2021 Ohio Product Listing
2021 Ohio Product Listing2021 Ohio Product Listing
2021 Ohio Product Listing
 
2021 Illinois Product Listing
2021 Illinois Product Listing2021 Illinois Product Listing
2021 Illinois Product Listing
 
2021 Florida Product Listing
2021 Florida Product Listing2021 Florida Product Listing
2021 Florida Product Listing
 
2021 Estate Planning Catalog
2021 Estate Planning Catalog2021 Estate Planning Catalog
2021 Estate Planning Catalog
 
2021 California Product Listing
2021 California Product Listing2021 California Product Listing
2021 California Product Listing
 
2021 Workers Compensation product listing
2021 Workers Compensation product listing2021 Workers Compensation product listing
2021 Workers Compensation product listing
 
2020 New England Product Listing
2020 New England Product Listing2020 New England Product Listing
2020 New England Product Listing
 
Voss on Delaware Contract Law
Voss on Delaware Contract LawVoss on Delaware Contract Law
Voss on Delaware Contract Law
 
Be Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisBe Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexis
 
Legal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLegal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional Facilities
 
Real Estate Product Listing
Real Estate Product ListingReal Estate Product Listing
Real Estate Product Listing
 
AHLA Catalog 2019
AHLA Catalog 2019AHLA Catalog 2019
AHLA Catalog 2019
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Hacker Defense: How to Make Your Law Firm a Harder Target

  • 1. Hacker Defense: How to Make Your Law Firm a Harder Target A LexisNexis® White Paper
  • 2. Highlights Choose Strong Passwords • Criminals and state-sponsored attackers are targeting intellectual property, client information and avenues for business disruption. • It is up to law firms, which are attractive targets for hackers, to protect both themselves and their clients with security measures that keep up with increasing risk. • IT security policy needs to intelligently define who has access to which resources, and clearly outline and enforce the consequences of violations. Even though hackers can now employ powerful software to try to crack computer passwords, many times they don’t need to; they can simply guess. That’s because even in our high-tech world, most people still choose lousy passwords. For years, “password” has been far and away the most popular choice,3 with “123456” holding a close second in rankings. Even lawyers can’t feel too superior to the average person: in 2012, for example, a large law firm was hacked, partly due to its password policy in which login credentials were simply “law321”,4 preceded by the user’s initials. That’s not much better. To get an idea of how tough your password is, it’s worth testing it.5 • Other best practices include using strong passwords that are changed on a regular schedule. • To further keep the trust of clients and colleagues, legal professionals should be particularly wary of potentially compromising email attachments and other material received from unfamiliar or untested sources. Introduction In security, you are only as strong as your weakest link. A 2012 report of an FBI investigation1 suggested that a company’s weakest link might be its law firm. Every law firm keeps valuable and sensitive information on each of its clients—information that hackers would love to obtain. And that makes the firm an attractive target.2 It is up to law firms to protect both themselves and their clients with security measures that keep up with increasing risk. The firm can’t risk losing the trust of its clients. Here are some important ways that individual lawyers, and their firms, can improve the security of the information entrusted to them. Hacker Defense: How to Make Your Law Firm a Harder Target Change Passwords on a Schedule It is also much harder for hackers to hit a moving target. Even if your IT department doesn’t require it, you should change your password regularly. Set yourself a reminder every 90 days or so and stick to a schedule. It may seem like a lot of work for a seemingly invisible reward, but the stakes involved make it too important to skip. Choose strong passwords and change them regularly for the same reason you go to the dentist or get the oil changed in your car: the hassle is well worth it to help prevent the potential long-term downside. Be a Healthy Skeptic Thanks to popular movies, many people imagine that hacking goes on invisibly, with guys in basements directly accessing top-secret databases, typing in lines and lines of code. In reality, hacking computers is very hard. It is much easier to hack people. Often, a hacker exploit looks more like this: you receive an email from what seems to be a new colleague at your client’s office. Attached in the email is a link to a document. You click on the link, and perhaps you read the document. Later, you find out your client files have been compromised and your firm’s name is in the news. That’s how hackers have operated internationally in recent years and duped employees of several law firms6 to compromise their own security.
  • 3. As a legal professional, and as someone who has the access to information that a hacker would love to have, it’s up to you to be an extreme skeptic. Discs, drives, emails and even documents from established as well as unknown sources should all have to prove themselves before you do anything with them. Technology changes so fast, it’s almost impossible to tell how a hacker’s exploit might arrive. As a result, it’s up to you to look at what you can find out: what’s the source, have you seen it before and is it vetted in some way? If you aren’t sure, report it to your IT department ASAP. That goes for unexpected phone calls too. Stay on a “Need to Know” Basis The IT department that won’t give you access to something may actually be doing you a favor. First of all, the fewer people have access to an asset, the safer that asset is. High-risk assets, and the people with access to them, need to be watched more closely. That can mean more oversight and procedure, which might slow you down. Law Firms Need to Keep the Trust of their Clients Law firms need to stay sharp because corporate security is getting harder, not easier. At the same time, companies are starting to recognize7 that information security is a fundamental business issue—one that demands an increased focus on cyber resilience, not just security. The reason is simple: criminals and state-sponsored attackers are targeting intellectual property, customer information, and avenues for business disruption. That makes law firms an ideal target. With increased threats, clients will be more careful about choosing partners that they can trust. The solution can’t rely only on user behavior. People will continue to choose their pets’ names as passwords, and none of those names will be something really secure like “C”^S=K~=y-”5(ss”. In response, law firm partners and their IT departments need to leverage technologies and create policies that protect themselves and their clients. Security policy needs to intelligently define who has access to which resources, and clearly outline and enforce the consequences of violating that policy. It also needs to protect from both the inside and the outside, with strong network security, usage monitoring, intrusion detection and sophisticated reporting. Hacker Defense: How to Make Your Law Firm a Harder Target
  • 4. The Solution for Legal Professionals LexisNexis® Public Records, with its unparalleled search, analytics and reporting technologies, can uncover hidden connections—even when entities don’t have a record in common—and raise red flags to help you improve your due diligence efforts. To learn how you can locate and get a more complete picture of people and businesses across the U.S., visit www.lexisnexis.com/publicrecords. For more topics that are transforming the legal industry, visit www.thisisreallaw.com. This document is for educational purposes only and does not guarantee the functionality or features of LexisNexis® products identified. LexisNexis does not warrant this document is complete or error-free. If written by a third party, the opinions may not represent the opinions of LexisNexis. 1 Lynne Ahearn, “FBI’s look at electronic espionage uncovers law firms lack of data security,” WGA InsureBlog, March 22, 2012, http://blog.wgains.com/2012/03/22/fbis-look-at-electronicespionage-uncovers-law-firms-lack-of-data-security/. 3 Erica Ho, “The 25 Most Popular (and Worst) Passwords of 2011,” Time, November 22, 2011, http://techland.time. com/2011/11/22/the-25-most-popular-and-worst-passwords-of2011/#ixzz2n0xWNIyl. 2 Jennifer Smith, “Lawyers Get Vigilant on Cybersecurity,” The Wall Street Journal, June 26, 2012, http://online.wsj.com/news/ articles/SB10001424052702304458604577486761101726748. 4 Elinor Mills, “Hackers vow ‘hellfire’ in latest major data leak,” C|Net, August 28, 2012, http://news.cnet.com/8301-1009_357501931-83/hackers-vow-hellfire-in-latest-major-data-leak/. 5 Microsoft, Safety & Security Center, https://www.microsoft.com/ security/pc-security/password-checker.aspx. 6 Mike Mintz, “Cyberattacks on Law Firms – a Growing Threat,” Martindale.com Blog, March 19, 2012, http://blog.martindale. com/cyberattacks-on-law-firms-a-growing-threat. 7 Deloitte, “Technology, Media & Telecommunications Firms Boost Cyber Resiliency via Strategic Security Initiatives, Alliances and Training,” January 18, 2013, http://www.deloitte. com/view/en_US/us/press/Press-Releases/259bed453824c310 VgnVCM2000003356f70aRCRD.htm. LexisNexis, martindale.com and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Other products or services may be trademarks or registered trademarks of their respective companies. © 2014 LexisNexis. All rights reserved. BMH00414-0