The discovery that law firm email addresses were used for user login information on various breached third-party web services, including Dropbox, Yahoo and LinkedIn, highlights a potential blind side to many legal offices’ security protections.

Using services beyond the IT department’s control for work purposes, known as shadow IT, easily opens up an employee to cyberattacks, regulatory actions and inadvertent losses of sensitive data. Yet as shadow IT use is increasing, the move towards using unauthorized, but more established cloud storage services may help mitigate some, but far from all, of these risks.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]