It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Bolstering Law Firm Data Security

Posted by on in Data Security

Every organization has data that can be of use to cyberthieves. With the increasing popularity of bring-your-own-device (BYOD) policies, businesses have become more susceptible to damaging data breaches, and law firms are no exception to this alarming trend. The wealth of sensitive legal information contained on their servers presents a significant target for data thieves.

The state of data security in the legal sector was a major topic of discussion at a recent ABA Techshow, the American Bar Association Journal reported. Two cybersecurity experts, Sharon Nelson and Ben Schorr, warned that one of the biggest threats to law firm network security is personnel error. Legal employees who are allowed to access sensitive documents with their personal devices are leaving the door wide open for cyberthieves to enter a firm's network and compromise those files.

Furthermore, legal personnel are not doing enough to protect the information stored on their mobile devices. According to the news outlet, 36 percent of lawyers who use smartphones have lost one. Forty-six percent of those devices were not password-protected.

Law Practice Magazine contributors John Simek and Sharon Nelson argued that encryption should be a component of any data security solutions initiative. They recommended that lawyers encrypt all legal data contained on their mobile devices and computers. If a firm is backing up its data on a cloud network, that information should also be protected by encryption techniques. Some file copies can slip through the cracks, but the duo warned that backup media accounts for a large segment of legal data leaks.

At every level of access, sensitive files should be encrypted to prevent cyberthieves from reading their contents. This includes removable media such as thumb drives and wireless networks. By taking the proper steps to secure legal documents and other sensitive information, firms can mitigate the damage of a network breach.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 03 October 2013