Stéphane Nappo, 2018 Global Chief Information Security Officer of the Year and world-renowned cybersecurity leader once said, "It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it."
In legal services where trust, confidentiality, and credibility are of utmost importance, small to mid-sized law firms can no longer afford not to take a strategic, proactive approach to their information technology and security.
The Kentucky Bar Association has also weighed in, issuing a Formal Ethics Opinion in 2018 stating that attorneys have an ethical responsibility to implement cybersecurity measures to protect clients’ information.
What measures do you have in place to protect your network and your clients’ information from cyberattacks? Don’t fall for the belief that "it’s not going to happen to me." Small to mid-sized businesses are increasingly targeted by cybercriminals, and confidential client information is a high-value target for cybercrime.
For that reason, small to mid-sized law firms must remain vigilant in understanding their cyber risk and the threats they face. One of the most prevalent and potentially damaging threats today is ransomware, a type of malware that infiltrates the victim’s network and encrypts their data. The hacker then demands that the victim pay a ransom to regain access to their data. Ransomware is particularly dangerous because it can infect not just a single hard drive, but also any data within the victim’s network or server. Ransomware attacks can even strike the cloud.
The ransom demanded by the criminals is just a part of the total cost of a ransomware attack. Organizations must also factor in the cost of the downtime resulting from the attack, the average of which increased from $141,000 in 2019 to a staggering $274,200 in 2020.
Unfortunately, it’s not uncommon to have a false sense of security regarding your cyber threat readiness. Organizations that fall victim to ransomware usually have protection measures such as antivirus software and firewalls in place. But amid a quickly evolving cyber threat landscape, these tools alone are not strong enough to protect your firm, your clients’ data, and your reputation.
A determined hacker will find and exploit any gaps or weaknesses in your defenses, which is why we recommend a multi-layered approach to cybersecurity.
With a layered approach, each component of your cybersecurity plan has a backup to counter any flaws or gaps. This approach aligns with the National Institute of Standards and Technology (NIST) Cybersecurity Framework, voluntary guidance that integrates industry standards, guidelines, and best practices to help organizations understand and manage their cybersecurity risks.
The NIST Cybersecurity Framework includes five primary functions: Identify, Protect, Detect, Respond, Recover. Your cybersecurity layers should enable you to identify and protect your firm from cyber threats, detect when a bad actor has breached your defenses, and position your firm for the best possible outcome when responding to and recovering from a breach.
In regulated industries, following the NIST Cybersecurity Framework can help organizations comply with regulatory and compliance standards for data security, such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR).
Following the NIST framework, you can start building your cybersecurity layers. Below is our essential network security checklist. If you are not already doing these things, you should be—whether through your internal IT department or with the help of a managed service provider:
Ransomware attacks cost organizations thousands of dollars to pay the ransom, recover data, restore their systems, and protect their networks from repeat attacks—not to mention lost business, productivity, and reputational damage. And yet, all too often firms rely solely on their incident response plan—the response and recovery actions taken after a breach has already occurred—as their cybersecurity program.
Instead, pair your incident response plan with these essential cybersecurity layers focused on mitigating your risk and preventing a breach from happening in the first place.
Has your firm ever had a cybersecurity risk assessment? If you don’t know what security measures your firm currently deploys or you are still relying on the same tools you used even a few years ago, your firm, your data, and your clients are all at risk.
A cybersecurity assessment will proactively identify gaps in your current IT infrastructure to help you understand potential security threats, the associated risks (e.g., downtime from ransomware), and the impact they may have on your firm so that you can shape a security strategy that protects your valuable, confidential data and preserves your clients’ trust.
This article was originally published in the April 2021 edition of the Northern Kentucky Bar Association's Lex Loci.