devices, which enhance productivity,
also present obvious risks. Accordingly,
you will want to use security measures
and data protection strategies:
Password-protect all mobile devices. Use encryption tools for sensitive communications.
Data Protection Strategies. You
should minimize data storage on mo-
bile devices and:
• Install and utilize data wiping tech-
nology to help manage risks pertain-
ing to lost/stolen devices.
• Consider partitioning smartphones
to segregate business and personal
data and apps.
• Use tracking software to locate the
device once it is connected to the
• Preclude installation of applications
that may create security issues.
• Regardless of the temptation, don’t
use your laptop (and its sensitive
client information) as payment collateral with an alleged prostitute. 14
• Use a firewall to reduce unauthorized access.
DATA BREACH RESPONSE PLAN
As the number of cyber attacks increase
overall, there is nothing to indicate law
firms are immune, in fact, some con-
sultants now see professional firms as
likely targets for cyber attacks. While
reducing vulnerabilities is important,
law firms — like other businesses — also
need to figure out how to respond to a
Start (and End) at the Top.
Make sure your organization’s leaders
are aware of the risks associated with
potential breaches. Educate them about
best practices, your response plan, and
provide periodic updates.
Know What Information You
Have. Learn what is stored (personal
information, health information, client trade secrets), where it’s stored
(on premises, cloud), how it’s stored
(encrypted or not), and who has access to it (internal IT, subcontractors,
service providers). Answers to these
questions will help inform the details
of your plan.
Identify Response Team Members and Roles. Establish a team
leader and specific members from different teams within your organization
As the number of cyber attacks increase overall,
there is nothing to indicate law firms are immune;
in fact, some consultants now see professional
firms as likely targets for cyber attacks.