Protect Your Firm From Cyber Attack: Tips to Boost Cyber Security - Technologist
Technologist - The FindLaw Legal Technology Blog

Protect Your Firm From Cyber Attack: Tips to Boost Cyber Security

In Consero's 2013 survey of 52 Fortune 1000 general counsel, one of the issues at the top of everyone's list was cyber security. The Association of Corporate Counsel came to a similar conclusion in its 2013 survey of when 72% of attorneys surveyed found data breaches and protection were of serious importance in the coming year.

Protecting your infrastructure from cyber attacks is not just a governmental concern; with all of the sensitive and private information that law firms have, protection from cyber attack should be a top priority. So, what should you do to protect yourself, your firm and your clients?

1. Training

Take the time to do training with all of your employees on the basics: don't click on mysterious links, don't download unexpected attachments, and change passwords frequently -- and what a strong password really is. By taking time to do the little things, you're protecting yourselves from big problems down the line.

2. The IT Department is Your New Best Friend

Communicate with your IT department about the kinds of protections your firm, or company, has in place in place to deal with a cyber security breach. Even if you don't normally interface with the IT department, now would be a good time. They are usually the first ones to know about a breach, so you all want to be on the same page when it comes to preparing for a breach, and how to deal with it if one occurs.

3. Follow Protocol

Wha's been breached? Is the info sensitive in nature? Do you need to contact the client? The answer to these questions will determine what you do next. Hopefully, you already have a plan in place to help you deal with those issues.

With technology and the kinds of risks our technology is exposed to, constantly changing, it's important we stay on top of ways we can protect ourselves. The more you do to prepare, the less you'll have to deal with in the event of a breach.

Related Resources: