Cybersecurity for Midsize and Smaller Law Firms: 10 Tips to Take Action Now

[caption id="attachment_20266" align="alignleft" width="245"]

Stephenie Yueng, Schnader Harrison Segal & Lewis[/caption] It is no secret that cyberattackers consider law firms to be rich sources of valuable data. Escalating risks and client expectations mandate that midsize and smaller firms, with fewer than 200 attorneys, treat cybersecurity as a core element of their legal practice. Like their larger counterparts, midsized and smaller firms must comply with rules of professional responsibility to take reasonable steps to prevent the inadvertent or unauthorized access to or disclosure of information relating to client representation. Moreover, smaller law firms must contend with many of the same cybersecurity challenges and threat actors as larger firms. With ransomware attacks and data breaches constantly in the news, clients increasingly demand and expect their vendors—law firms included—to take steps to improve and ensure data security. In this evolving landscape, it is no longer reasonable for any firm, large or small, to treat cybersecurity as solely an information technology issue. How much protection you need depends on the state of your technology systems, legal considerations such as applicable ethical rules, government and industry regulations, data protection laws, and client security requirements. It is also crucial for management and IT to consider and strike the appropriate balance between security and operability. Although cost is certainly a factor, many essential steps are scalable and affordable for all firms. This article will focus on 10 practical steps that will enable the smaller firm to identify its risks, take appropriate action, and protect its systems and clients.

  • Know what you have and how data flows.

The first step toward building a cybersecurity program is to understand your systems and data. Start with an inventory of your hardware—computers, servers, printers, smart devices—including the model and serial numbers of the devices that are connected within your office network and the internet. Next, catalog the software you have installed on your systems. Because software is subject to periodic updates, you should determine which version they are and record when they were last patched. Compile a list of the online services that the firm uses including, for example, legal research, document review, file transfers, or email. Armed with this information, one can assess the security implications of each device, software, or service. The same inventory process and analysis should be done for your data to understand how data flows within your firm. Identify the type of data you have, who creates it, where it is stored, and how it is shared with external parties. Note in particular if any of the data is subject to any legal regulation such as HIPAA or other sectoral data protection laws, or outside counsel guidelines. Improving your understanding of the data you have and how it flows within your system will allow you to better identify the types of data you hold and understand their value and vulnerability to internal and external threats.