How Oklahoma Law Firms Protect Client Data (SlideShare)

Post on 14-Apr-2017

90 views 0 download

Transcript of How Oklahoma Law Firms Protect Client Data (SlideShare)

Courtesy of Emsco Solutions

http://www.ITSecurityforOKCLawyers.com

How Oklahoma Law Firms

Protect Client Data

Sponsored by http://www.ITSecurityforOKCLawyers.com

Oklahoma law firms handle

highly sensitive information

on a daily basisRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Intellectual property details

Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Confidential trade secrets

Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Client personal and

privileged informationRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Case-related financial

and medical information Ron Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Recently publicized

data breaches emphasize

the critical importance

of reliable and effective

data securityRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

As a result of potentially

catastrophic breaches

like this,Ron Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

updated ethics standards

require Oklahoma lawyers

to take reasonable steps

to ensure that client data

remains safeRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Require Two-Factor

AuthenticationRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Two-factor authentication

provides an extra layer

of security to privileged

administrator accountsRon Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Other recommended

authentication controls

include:Ron Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Blocking users who log in

from countries where the

firm does not conduct

business Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

• Blocking login attempts

that originate from

anonymous networksRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Implement Real-Time

Security DefensesRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Criminals often use

targeted emails to break into

protected networks, a ruse

known as ‘spear phishing'Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Law firms have set up

security gateways that

provide real-time protectionRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Upgrade Database

Security ControlsRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Oklahoma law firms have

upgraded security controls

to limit access to their

databases,Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

encrypt stored files, and

instantly patch any detected

vulnerabilitiesRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Establish an Employee

Awareness ProgramRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Law firms are educating

their staff to recognize

fraudulent communications

and websites,Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

refrain from putting

confidential data onto

portable items that are

easily lost (jump drives),Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

and confine all confidential

communications to within

the company firewallRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Hire a Specialist Security

Services ProviderRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

A security services provider

can deliver contract-based

assistanceRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

that is less expensive

but no less effectiveRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Bottom Line

Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

ABA Model Rule 1.6. (c)

states that lawyers must

make “reasonable efforts”

to prevent client information

from being compromisedRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Employee awareness and

strong security controls will

put them in an excellent

position to withstand most

dangersRon Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Does your firm use any

security measures not

included in this article?Ron Vaughn

Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

If so, what are they?

Ron Vaughn Solutions Specialist

Sponsored by http://www.ITSecurityforOKCLawyers.com

Let us know your thoughts

in the Comments box belowRon Vaughn

Solutions Specialist

Copyright © Emsco Solutions

Is Your Oklahoma Law Office’s Network

Security the Best it Can Be?

Download Your Free

IT Security Checklist for

Oklahoma Law Firms

Now at http://www.ITSecurityforOKCLawyers.com