Defense Industrial Base (DIB) contractors and organization seeking compliance (OSCs) that handle CUI must act now to ensure compliance with the new CMMC v2.
Managed XDR Suite
Petronella’s Managed Extended Detection And Response (XDR) With SOC Allows Any Size Organization With Any Size Budget To Vastly Reduce Cyber Risk.
Many other IT providers our there are just in it for the money. We TRULY care about our customers. When you are our customer, you are part of our family, and we treat you that way.
From Progressive Law Practice:
Since legal matters necessarily involve the client sharing sensitive financial and personal information with their lawyer and support staff, the attorney should ensure the client understands:
Who from the firm may communicate with the client to obtain the information
Appropriate methods for disseminating information to the law firm
The steps the lawyer expects the client to take to ensure they do their part to protect the data
That they should immediately inform the attorney if, somehow, the confidential data was inadvertently or improperly shared with outsiders
Steps Lawyers Can Take to Protect Client Data
Recently, Internet giant Yahoo! announced that millions of its users had their accounts hacked. Despite the multitude of precautions Yahoo! puts in place to prevent such infiltrations, cyber hackers still succeeded at infiltrating Yahoo’s database. However, that reality doesn’t necessarily mean lawyers are helpless when it comes to protecting their client’s sensitive information.
According to Craig Petronella, an IT Cybersecurity Expert and namesake of Petronella Computer of Raleigh, North Carolina, there are steps members of the legal community can take to thwart cyber-hackers.
They include:
Moreover, despite the constant interaction a law firm’s administrative team has with private client information, they aren’t accountable to retain that data privately as is the lawyer. The Rules of Professional Conduct clearly state the lawyer must “oversee and ensure the staff is practicing the same level of confidentiality” as the attorney does, Lenon says.
One method to accomplish that is for the lawyer to use security software that monitors and tracks access to the confidential information, Petronella suggests.
Clio’s ‘Firm Feed’ software tracks changes made to a case file so the managing partner can easily track and review amendments made to it, Lenon says. The software also details who has been accessing and viewing data contained within a file, another way to ensure that prying eyes haven’t gained improper access.
A law firm can be proactive at protecting confidential client data and educate their clients about doing their part to ensure private information stays that way, but then blow it all by what Lenon calls “giving away the keys.” An example of that is writing passwords on post-it notes and sticking them on computer monitors where anyone can see them, he says.
Another ways lawyers let their guard down when it comes to protecting client data is by using their smartphones to communicate confidential information. “Did you know your smartphone stores every keystroke you’ve ever typed?” poses Petronella.
And, he notes, that memory bank is not being created by a sinister Trojan virus or nefarious key logger. Instead, it is simply the database the phone relies on to supply AutoComplete results, he says.
“You can’t dig in and see the keystrokes yourself, but external software (malicious apps) can read back that database and thus read out every text or email you’ve sent and, more importantly, every password you’ve ever typed,” Petronella says.
Read the full article here.
Protect Your Business Today
Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.
Need help implementing these strategies?Our cybersecurity experts can assess your environment and build a tailored plan.
CEO & Founder, Petronella Technology Group | CMMC Registered Practitioner
Craig Petronella is a cybersecurity expert with over 24 years of experience protecting businesses from cyber threats. As founder of Petronella Technology Group, he has helped over 2,500 organizations strengthen their security posture, achieve compliance, and respond to incidents.