Increasing Client Requirements: Securing Law Firms for the 21st Century
Gone are the days of "basic security." What used to be optional is now standard: two factor authentication, complex passwords, clean desk policies, data encryption at rest and in transit, mobile device management and up-to-the-minute patching. Clients expect these items to already be in place and are further expanding their expectations.
October 29, 2019 at 03:48 PM
7 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Gone are the days of "basic security." What used to be optional is now standard: two factor authentication, complex passwords, clean desk policies, data encryption at rest and in transit, mobile device management and up-to-the-minute patching. Clients expect these items to already be in place and are further expanding their expectations. They expect sophisticated and secure systems to keep their information safe. This obviously makes your IT professional's job much harder. Additionally, attorneys expect instant performance and near 100% up time. Achieving the delicate balance between accessibility and security is a challenge. Meanwhile, clients continue focusing attention on documentation, planning and training.
The frequency of client-initiated audits has increased dramatically over the last five years. In 2013, Frandzel received its first audit; it was one page long and consisted of seven questions. In 2018, the firm received five audits. All were greater than one hundred pages in length. The longest one included over seven hundred questions. All of the inquiries seek documented information security policies, incident response plans and business continuity plans. Vulnerability scans of networks are required on a monthly basis, with classification and inventory controls put in place immediately. Clients seek annual security awareness and phishing defense training for all staff. The most consistent change is a requirement that the firm conduct substantial employee background checks for every new hire.
Information Security Policies
Developing one security policy for all clients is far simpler than answering every question individually. This practice also provides the firm and its third party vendors with guidelines to adhere to. These policies become a firm's bible to follow with regards to information technology security. They include general information on security management standards, classification and controls, information users, guidelines for personnel and physical security.
- Information Security Policies. These identify: 1) the firm's Information Security Manager (ISM), the person responsible for your information technology; 2) how to manage sensitive information; and 3) who can access what in your firm.
- Classification and Control. This describes the fundamentals of information security, including a description of the information you maintain and how is it classified (i.e., private, sensitive, restricted or confidential).
- Information Users. In most cases, the human factor is a firm's greatest risk. Password standards, workstation security and automatic screen protection, end-of-day log off requirements, unusual behavior detection, mobile device protection, good judgment policy and most importantly, training all come into play.
- Physical Security. Having physical controls in place helps staff follow standards with regards to securing visitors and physical rooms. Educating staff regarding visitor policies, such as keeping a log with the visitor's name, date, purpose of visit and physically keeping all server rooms locked, also aid in security. These are standard requirements and commonly considered basic controls today.
Incident Response Plan
This documents your organization's formal response plan in preparation for a breach. Requirements in this area vary widely. Clients frequently dictate policy inclusions such as maximum notification times, specific contacts, and general best practices. Regardless of whether client requirements exist, general best practices include developing these procedures today. It is common for these policies to include some or all of the following:
- Names of your incident response team and key clients and the numbers you need to call if an incident occurs;
- The name of your key resources needed to maintain or resume operations;
- Procedures for various incidents;
- Inventory of all hardware;
- Inventory of all software;
- Inventory of connectivity vendors;
- Inventory of critical IT documents;
- Location of data;
- Location of passwords; and
- Inventory of vital business records.
Business Continuity Plans
A growing best practice is to combine both business continuity and incident response plans into a single document. They are of equal importance and tend to contain similar information. Whether it's a breach, fire, earthquake, etc., you will need to follow documented plans of action equally. The primary focus is to ensure operability of technology resources without interruption to minimize loss of revenue. Properly documented and tested plans will enable your firm to remain standing.
Vulnerability Scans
Our firm has been executing vulnerability scans for several years. After executing the initial scan we realized how critically important these scans were. Numerous open ports, default passwords, and service accounts that historically didn't matter provided opportunities for access, hacking, and even email relays. Once the openings were identified, we realized what was open, the process of making refinements was effective and permanent. Future scans identified minimal vulnerabilities and risks, which were created due to modifications and improvements in the environment. As our system continues to mature, security risks diminish and confidence both internally and with the firm's clients improved.
Classification and Inventory Controls
What do you have, where is it located and how is it classified? Prior to inventorying documents, one must understand what is in one's possession. Some of our firm's clients are classifying documents when they send them to us with designations such as Restricted, Confidential, Internal and Public. Because of client turnover, mergers, etc., clients are inquiring more frequently as to what client data is contained within our system. Developing a reference of contents that identifies contents will ease in your ability to respond. Collaborating with information technology professionals, managing attorneys, and internal practice groups will help accelerate this process. Clients are increasing the frequency with which they are making these requests; getting in front of them early will help your firm prepare for the inevitable.
Security Awareness Training
Security Awareness Training seems the most basic of items, but is one of the most difficult to adhere to. End users frequently believe that "it won't happen to me," "I'm tech savvy," or "I can spot a scam a mile away." This risk involves human awareness and training, and it likely provides the most risk and vulnerability within your firm's environment. Clients are well aware of publicized security breaches, and are beginning to mandate that law firms require annual security training for all staff. Best practices suggest utilizing an external party that is fully equipped, knows the industry, and is current with ongoing and increasing scams. Utilizing an expert will help maintain an interested audience for a longer period. Preventing breaches by investing in training will result in a tremendous return on investment.
Phishing Defense Training
Conducting a random click sampling via emails distributed to a firm's end users has the potential to create the most eye opening of events. A test email is pushed out randomly after everyone has been through Security Awareness Training. The intent is not to trap or blame employees; quite the opposite, it is to be utilized as a training tool to help them naturally identify and avoid future scams. Clients have not yet begun to demand this type of training. Regardless, we are doing this in an effort to better educate and prepare our attorneys and staff.
Preparing for Ongoing Security Challenges
Client requirements for law firms around security policies, procedures, and preparation will remain steadfast. We anticipate them continuing to escalate over time. By staying on top of ongoing audit requests, performing scans, and training employees, our firm is in a strong position. We utilize our experience and investment as a marketing tool to garner new business. While some attempt has been to minimize client requirements, embracing change and protecting your firm's information security investment is not only wise, it may even impress your clients and garner the firm more business.
*****
Debra Gray is Executive Director of Frandzel Robins Bloom & Csato, L.C.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All!['None of Us Like It': How Expedited Summer Associate Recruiting Affects Law Students and the Firms Hiring Them 'None of Us Like It': How Expedited Summer Associate Recruiting Affects Law Students and the Firms Hiring Them](https://images.law.com/cdn-cgi/image/format=auto,fit=contain/https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/78/a3/6a3907574038b1c9149206cf2a4c/recruitment-767x633-1.jpg)
'None of Us Like It': How Expedited Summer Associate Recruiting Affects Law Students and the Firms Hiring Them
![After Shutting USAID, Trump Eyes Department of Education, CFPB After Shutting USAID, Trump Eyes Department of Education, CFPB](https://images.law.com/cdn-cgi/image/format=auto,fit=contain/https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/18/40/0fe2b45b4563907fc23db745adbf/donald-trump-767x633-1.jpg)
After Shutting USAID, Trump Eyes Department of Education, CFPB
!['A Shock to the System’: Some Government Attorneys Are Forced Out, While Others Weigh Job Options 'A Shock to the System’: Some Government Attorneys Are Forced Out, While Others Weigh Job Options](https://images.law.com/cdn-cgi/image/format=auto,fit=contain/https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/02/c8/47d457c84e2ba6f1200184b3b2e2/murphy-767x633-1.jpg)
'A Shock to the System’: Some Government Attorneys Are Forced Out, While Others Weigh Job Options
7 minute read![GOP Now Holds FTC Gavel, but Dems Signal They'll Be a Rowdy Minority GOP Now Holds FTC Gavel, but Dems Signal They'll Be a Rowdy Minority](https://images.law.com/cdn-cgi/image/format=auto,fit=contain/https://k2-prod-alm.s3.us-east-1.amazonaws.com/brightspot/4e/5a/5ad53ca64ad18684ad71233d78fb/alvaro-bedoya-767x633.jpg)
GOP Now Holds FTC Gavel, but Dems Signal They'll Be a Rowdy Minority
6 minute readTrending Stories
- 1January Petitions Press High Court on Guns, Birth Certificate Sex Classifications
- 2'A Waste of Your Time': Practice Tips From Judges in the Oakland Federal Courthouse
- 3Judge Extends Tom Girardi's Time in Prison Medical Facility to Feb. 20
- 4Supreme Court Denies Trump's Request to Pause Pending Environmental Cases
- 5‘Blitzkrieg of Lawlessness’: Environmental Lawyers Decry EPA Spending Freeze
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250