How to Keep Mobile Data Safe: The Case for On-Device AI
Bring-your-own-device is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets.
August 09, 2019 at 07:00 AM
9 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
For over a decade, mobile devices have unleashed new levels of productivity, efficiency, and collaboration. Many companies have already moved their IT applications onto mobile platforms for workers who aren’t tethered to a desk (about 70% of the workforce, according to Deloitte). In fact, Deloitte contends that in next five to 10 years, the 100% mobile employee will be the majority of all workers.
While mobile lawyering means freedom for the always-on attorney, it also creates serious challenges for their firm. BYOD (Bring Your Own Device) is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets. Considering law firms are built on their reputation, firms must make every assurance that the technology they use will protect their data.
Cybersecurity can no longer be an afterthought. Stakeholders across the company — not just CIOs — must factor risk into every business decision to avoid the potential for any catastrophe. This means that firms must only partner with vendors that take a “security by design” approach when building their systems to ensure security is coded in from the start.
|Email Has Its Risk Factors
According to the American Bar Association 2018 Legal Technology Survey Report, 23% of respondents reported that their firm had experienced a data breach at some point. No firm is immune, resulting in increased pressure from clients who demand greater value and security from attorney-client relationships.
Email is a weak point for organizations because there is often a transfer of large and sensitive documents, and an email in transit is an easy point of entry for hackers. For this reason, firm’s turn to Document Management Systems (DMS) to reduce the need to distribute files via email by enabling users to share directly from the system interface. Organizing emails through a DMS is also how firm’s stay compliant with legal regulations; however, lawyers still depend on a grab bag of manual drag-and-drop features in Microsoft Outlook that are highly susceptible to human error.
New innovations are improving how we use email though. Management tools that apply the power of Artificial Intelligence (AI) are transforming workflow behaviors and processes. For example, research has shown that human beings become bored and start to make mistakes after filing approximately 45 emails; by automating the process with AI, accuracy jumps to 95%. These high-performance actions — like predictive filing to a DMS or wrong recipient detection — are greatly enhancing compliance and security (not to mention efficiency) for law firms today.
There are barriers to adoption for mobile AI technologies, however, because of sensitivities around data security vulnerabilities. Historically AI on mobile has been a security challenge because most applications send data to the cloud for processing, which means moving data in and out of your device. This is when it’s easiest to steal, hack into or simply access files. This simple fact has made many mobile solutions out of reach for most firms adhering to compliance policies. Yet, according to a Deloitte study, 39% of enterprises still prefer cloud-based services as the delivery platform for AI and advanced technology-based applications, versus just 15% who favor on-premise.
Nevertheless, there is an alternative approach that eliminates these security weaknesses. With the advent of edge computing, data processing can now take place on the device itself. Instead of using third-party cloud or storage processing, on-device AI is similar to an on-premise system but works by operating inside the mobile device to ensure all data remain completely inside the firm’s security perimeter. Edge computing requires exceptionally sophisticated engineering, and the ability to write code that is tight enough, and efficient enough, to fit, literally, in the palm of your hand.
|On-Premise AI Architecture
Ensuring that sensitive data never leaves a device is the only failsafe way to prevent an attack. Hardware providers like Apple use 256-bit AES encryption as the default on every iOS device, while a unique identifier (UID) is used as the key for encryption. Because iOS supports industry-standard networking protocols for data transmission, most other apps — including calendar and email clients — automatically use these same protocols to enable an encrypted communication channel between the device and network services.
On-device AI — or edge computing — provides a decentralized way to process data so that it’s nearly impossible for bad actors to access. The method for computation on edge is to fetch the raw data (e.g., email, DMS, time keeping) from on-premise or cloud services, and then analyze it to provide productivity features for the user. In order to fetch this data from each service, different APIs should be implemented, and industry authentication standards need to be met — including certificate-based authentication, two-factor authentication, and different types of SSOs.
For some networks, mostly cloud services, connecting through REST (representational state transfer) API over HTTPS is enough; however in the case of on-premise services, other challenges exist. Because these networks are not visible from the Internet, a VPN or per-app VPN is required to access internal resources at the application level. In addition, some legacy services do not support modern REST API and there is a need to implement law level TCP/IP level protocols.
Once there is a secure connection, it’s critical to organize the fetched data and sync it with the providers. Because some on-premise legacy systems were not designed to connect with outside devices, it’s vital to have a minimal and balanced load transfer. In the same way it’s important that battery usage on mobile devices is used wisely to minimize drain, designing for optimal data performance is essential for effective edge computing architecture.
For instance, it’s important to use light and efficient Natural Language Processing (NLP) libraries and Machine Learning models for data preprocessing on mobile devices in order to provide output to the user quickly and accurately. The stored data at rest should then be secured by strong encryption so that in the event of unauthorized access or theft, the data remains invisible and can never be compromised.
|Mobile Device Management
Purchasing innovative technology isn’t the only security measure a law firm needs to take. Vigilance is a continual effort and IT management must be executed from the top down. As the BYOD approach has become popular among corporations, a well-defined Mobile Device Management (MDM) strategy is a critical aspect of the policy.
MDM systems allow administrators to control, secure and enforce policies on smartphones, tablets and other endpoints. It give employees the flexibility to use the device (and applications) of their choosing, while providing the firm layers of protection. In the event of a lost or stolen device, all stored data can be remotely wiped from the device.
There are best practices strategies that keep in mind when developing your firm’s mobile device policy. IT administrators should consider the following to safeguard from potential security incidents:
- App Management: 76% of mobile apps have a vulnerability so controlling which mobile apps are being used is important consideration for BYOD. The most common vulnerability is insecure data storage, which opens up opportunities for attackers to stage phishing attacks or steal user credentials. Exploitation most often happens through malware, which puts users at risk of being hacked remotely without the need for physical access to the device.
- Require a PIN: Look for applications that require users to set a PIN code. Remote intruders are deterred because it involves manual data entry; and intruders that do try face a PIN system with a limit for unlock attempts before shutting down the app or device. A four-number pin offers 10,000 possible combinations, so given four attempts to authenticate against the universe of 10,000 codes, the intruder has only a .04% chance of success. That’s why some people say PIN security is actually better than password security.
- Auto-lock: Administrators can set the complexity of the passcode. They should also set a time interval (in minutes) after which the user is able to login without re-entering the PIN.
- Prevent Data Leakage: This policy enables administrators to enforce (via MDM configuration) restrictions on users and prevent them from exposing content. When enabled, users are not be able to copy, cut or paste data from an open screen to the clipboard, prints screen is also disabled.
Modern digital technologies such as smartphones have impacted the everyday workflow for the better, making us all more effective. But they’ve also introduced new security risks to law firms and created the need for vigilance.
Whether a firm deploys its applications in the cloud or decides to keep them on-premises, data security will always be paramount. But for law firms, there’s peace of mind knowing data stays inside the IT infrastructure.
Given the potential for reputational damage and more, CIOs and IT administrators should prioritize vendors that deploy on-premise AI to make these security concerns irrelevant once and for all.
Gevorg Karapetyan is Co-Founder and Chief Technology Officer at Zero leading the company’s immediate and long-term technology vision. He holds a PhD in Computer Science and has over a decade of experience developing intelligent automation systems.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250