Skip Ribbon Commands
Skip to main content

Law Firms and Information Governance

08/07/2019


The Wall Street Journal published Cyberattack Exposes Law Firms’ Weak Spots in December 2016, revealing the legal industry’s continued digital vulnerabilities. The siren song rang ominously across the continent – prompting many firms to report significant security upgrades in hopes of rebuilding stakeholder confidence and assuring clients and regulators they’re taking the necessary steps to prevent future attacks.

But they may be missing the point.

While improving perimeter security is certainly a critical step, its far from the only one. Hackers can and will eventually find ways around that initial line of defence. And if they do – using phishing schemes or other methods – they can gain easy access to emails, documents and other sensitive information inside the firm.

From Macro to Micro

Attacks are becoming more frequent and sophisticated, and it’s no longer practical to rely on strong castle walls alone to protect the crown jewels. Looking beyond broad-based controls, a strong information governance strategy considers how organizations can reduce the harm of a worst-case scenario by taking a more granular approach to protecting information.

Restricting information access to only those who need to materials for their business purposes is one possible measure. Encrypting and protecting work products with multiple authentication mechanisms is another. The following additional steps can help fend off most attacks and prevent (or at least mitigate) damage from a potential breach:

  • Educate and train users on information governance requirements and processes
  • Use strict security models, including encryption
  • Store work products in governed locations and under enforced data retention policies
  • Use information governance analytics to understand who is accessing information and how

Tomorrow’s technology is shaping business today. To learn more about how MNP can help you leverage information governance to reinforce your cyber security strategy, contact John Desborough, Director Consulting and Technology Solutions at [email protected].