Increasing Client Requirements: Securing Law Firms for the 21st Century
Embracing change and protecting your firm's information security investment is not only wise, it may even impress your clients and garner the firm more business.
October 07, 2019 at 09:30 AM
7 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Gone are the days of "basic security." What used to be optional is now standard: two factor authentication, complex passwords, clean desk policies, data encryption at rest and in transit, mobile device management and up-to-the-minute patching. Clients expect these items to already be in place and are further expanding their expectations. They expect sophisticated and secure systems to keep their information safe. This obviously makes your IT professional's job much harder. Additionally, attorneys expect instant performance and near 100% up time. Achieving the delicate balance between accessibility and security is a challenge. Meanwhile, clients continue focusing attention on documentation, planning and training.
The frequency of client-initiated audits has increased dramatically over the last five years. In 2013, Frandzel received its first audit; it was one page long and consisted of seven questions. In 2018, the firm received five audits. All were greater than one hundred pages in length. The longest one included over seven hundred questions. All of the inquiries seek documented information security policies, incident response plans and business continuity plans. Vulnerability scans of networks are required on a monthly basis, with classification and inventory controls put in place immediately. Clients seek annual security awareness and phishing defense training for all staff. The most consistent change is a requirement that the firm conduct substantial employee background checks for every new hire.
Information Security Policies
Developing one security policy for all clients is far simpler than answering every question individually. This practice also provides the firm and its third party vendors with guidelines to adhere to. These policies become a firm's bible to follow with regards to information technology security. They include general information on security management standards, classification and controls, information users, guidelines for personnel and physical security.
1. Information Security Policies. These identify: 1) the firm's Information Security Manager (ISM), the person responsible for your information technology; 2) how to manage sensitive information; and 3) who can access what in your firm.
2. Classification and Control. This describes the fundamentals of information security, including a description of the information you maintain and how is it classified (i.e., private, sensitive, restricted or confidential).
3. Information Users. In most cases, the human factor is a firm's greatest risk. Password standards, workstation security and automatic screen protection, end-of-day log off requirements, unusual behavior detection, mobile device protection, good judgment policy and most importantly, training all come into play.
4. Physical Security. Having physical controls in place helps staff follow standards with regards to securing visitors and physical rooms. Educating staff regarding visitor policies, such as keeping a log with the visitor's name, date, purpose of visit and physically keeping all server rooms locked, also aid in security. These are standard requirements and commonly considered basic controls today.
Incident Response Plan
This documents your organization's formal response plan in preparation for a breach. Requirements in this area vary widely. Clients frequently dictate policy inclusions such as maximum notification times, specific contacts, and general best practices. Regardless of whether client requirements exist, general best practices include developing these procedures today. It is common for these policies to include some or all of the following:
- Names of your incident response team and key clients and the numbers you need to call if an incident occurs;
- The name of your key resources needed to maintain or resume operations;
- Procedures for various incidents;
- Inventory of all hardware;
- Inventory of all software;
- Inventory of connectivity vendors;
- Inventory of critical IT documents;
- Location of data;
- Location of passwords; and
- Inventory of vital business records.
Business Continuity Plans
A growing best practice is to combine both business continuity and incident response plans into a single document. They are of equal importance and tend to contain similar information. Whether it's a breach, fire, earthquake, etc., you will need to follow documented plans of action equally. The primary focus is to ensure operability of technology resources without interruption to minimize loss of revenue. Properly documented and tested plans will enable your firm to remain standing.
Vulnerability Scans
Our firm has been executing vulnerability scans for several years. After executing the initial scan we realized how critically important these scans were. Numerous open ports, default passwords, and service accounts that historically didn't matter provided opportunities for access, hacking, and even email relays. Once the openings were identified, we realized what was open, the process of making refinements was effective and permanent. Future scans identified minimal vulnerabilities and risks, which were created due to modifications and improvements in the environment. As our system continues to mature, security risks diminish and confidence both internally and with the firm's clients improved.
Classification and Inventory Controls
What do you have, where is it located and how is it classified? Prior to inventorying documents, one must understand what is in one's possession. Some of our firm's clients are classifying documents when they send them to us with designations such as Restricted, Confidential, Internal and Public. Because of client turnover, mergers, etc., clients are inquiring more frequently as to what client data is contained within our system. Developing a reference of contents that identifies contents will ease in your ability to respond. Collaborating with information technology professionals, managing attorneys, and internal practice groups will help accelerate this process. Clients are increasing the frequency with which they are making these requests; getting in front of them early will help your firm prepare for the inevitable.
Security Awareness Training
Security Awareness Training seems the most basic of items, but is one of the most difficult to adhere to. End users frequently believe that "it won't happen to me," "I'm tech savvy," or "I can spot a scam a mile away." This risk involves human awareness and training, and it likely provides the most risk and vulnerability within your firm's environment. Clients are well aware of publicized security breaches, and are beginning to mandate that law firms require annual security training for all staff. Best practices suggest utilizing an external party that is fully equipped, knows the industry, and is current with ongoing and increasing scams. Utilizing an expert will help maintain an interested audience for a longer period. Preventing breaches by investing in training will result in a tremendous return on investment.
Phishing Defense Training
Conducting a random click sampling via emails distributed to a firm's end users has the potential to create the most eye opening of events. A test email is pushed out randomly after everyone has been through Security Awareness Training. The intent is not to trap or blame employees; quite the opposite, it is to be utilized as a training tool to help them naturally identify and avoid future scams. Clients have not yet begun to demand this type of training. Regardless, we are doing this in an effort to better educate and prepare our attorneys and staff.
Preparing for Ongoing Security Challenges
Client requirements for law firms around security policies, procedures, and preparation will remain steadfast. We anticipate them continuing to escalate over time. By staying on top of ongoing audit requests, performing scans, and training employees, our firm is in a strong position. We utilize our experience and investment as a marketing tool to garner new business. While some attempt has been to minimize client requirements, embracing change and protecting your firm's information security investment is not only wise, it may even impress your clients and garner the firm more business.
Debra Gray is Executive Director of Frandzel Robins Bloom & Csato, L.C.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1'Largest Retail Data Breach in History'? Hot Topic and Affiliated Brands Sued for Alleged Failure to Prevent Data Breach Linked to Snowflake Software
- 2Former President of New York State Bar, and the New York Bar Foundation, Dies As He Entered 70th Year as Attorney
- 3Legal Advocates in Uproar Upon Release of Footage Showing CO's Beat Black Inmate Before His Death
- 4Longtime Baker & Hostetler Partner, Former White House Counsel David Rivkin Dies at 68
- 5Court System Seeks Public Comment on E-Filing for Annual Report
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250