Did you know that only 33% of law firms report having some sort of data protection policy? Additionally, a mirroring 33% report adopting cybersecurity training for their counselors and staff. (source)
According to many security experts and research on primary methods of cyber intrusions, most hackers gain access to a network due to the naive acts of ill-informed employees. Elizabeth Shirley, a practicing partner at Burr & Forman, “Top Lawyer” in Alabama, and cyber law expert, agrees with these assessments…
“One of the primary ways a hacker gains access to any organization’s network is through an unintentional act by an employee. Many times, they don’t even know they’ve made a mistake. Employees need to be trained to identify red flags and suspicious emails, to prevent a hacker from gaining access to the system.”
– Elizabeth Shirley, Partner, Burr & Forman
With cyber breaches costing organizations over $4 million on average, leaving staff uneducated on basic and essential cybersecurity provisions is a costly gamble. What’s more, it stands to reason that the fallout from a firm suffering a major cyberattack could be much higher.
Law firms typically store a considerable amount of personally identifiable information (PII) and other sensitive data when it comes to its clients. This not only makes for a prime target for black hat hackers, it leaves firms in the wake of a pricey aftermath with endless lawsuits and penalties.
In 2018, firms—and others in the legal industry—must shift from a reactive to a proactive approach to cybersecurity if they’re to avoid costly consequences.
One of the most effective ways to do this is by ensuring those using your network can identify red flags and avoid vulnerability. Thus, the first of three practices that work to protect your firm and clients’ data being to develop cybersecurity policies & procedures along with appropriately training internal employees.
While no one can guarantee your firm won’t fall victim to an intrusion attempt, this, along with the last two practices of proactive cybersecurity will diminish your vulnerability to an attack considerably…
To see the remaining two practices, read the article published in Law Technology Today—an American Bar Association publication—by AssureSign’s Jackson Burke and Burr & Forman’s Elizabeth Shirley.