[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row column_structure=”1_3,2_3″ _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”https://cybriant.com/wp-content/uploads/2017/09/Customer-Environment-History-1.png” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” _builder_version=”4.16″ animation=”off” sticky=”off” border_style=”solid” always_center_on_mobile=”on” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ border_style=”solid” global_colors_info=”{}”]Law firms and their clients’ sensitive information are a treasure trove for hackers. They not only hold valuable client information but also are regularly emailing attachments to clients, providing a possible means to get into client systems.
Law firms are seen as high-value targets for the rapidly growing use of ransomware and extortion schemes because they have historically weak defenses and are seen as able to pay large sums.
Here are some recent high-profile cyberattacks in the legal industry:
Cravath and Weil Gotshal
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.20.0″ hover_enabled=”0″ border_style=”solid” global_colors_info=”{}” sticky_enabled=”0″]
According to the BitSight’s Fourth Annual Industry Index Report, Legal service providers are arguably one of the most widely used third parties across the world, supporting some of the world’s largest banks and other well-known organizations. To steal intellectual property, trade secrets, and other sensitive information from companies with strong security measures, cyber criminals may target their outside counsel rather than the company itself.
Hackers attack legal providers because they may have weaker security measures in place. Compared to other industries examined, BitSight finds that companies in the Legal sector actually have high-security ratings and low rates of vulnerabilities that could lead to man-in-the-middle attacks. Despite these findings, the industry remains a key target for cyber criminals.
The Legal sector had the second highest percentage of companies with a security rating of 700 or higher, only trailing Finance and in-line with Retail.(BitSight Security Ratings measure the security performance of organizations. These ratings range from 250-900, with a higher rating indicating better security performance.)
More than 60% of organizations examined from the Legal sector are exposed to DROWN, a major SSL/TLS vulnerability.(DROWN is a vulnerability, discovered earlier this year, that could allow a criminal to decrypt secure communications and potentially expose information sent over HTTPS, such as passwords, usernames, and credit card details.)
[/et_pb_text][et_pb_image src=”https://www.cybriant.com/wp-content/uploads/2017/09/bitsight.png” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” _builder_version=”4.16″ animation=”off” sticky=”off” border_style=”solid” always_center_on_mobile=”on” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”https://www.cybriant.com/wp-content/uploads/2017/09/Cyber-facts.png” align_tablet=”center” align_phone=”center” align_last_edited=”on|desktop” _builder_version=”4.16″ animation=”off” sticky=”off” border_style=”solid” always_center_on_mobile=”on” global_colors_info=”{}”][/et_pb_image][et_pb_text _builder_version=”4.20.0″ hover_enabled=”0″ border_style=”solid” global_colors_info=”{}” sticky_enabled=”0″]
Recommendations
Update web server configurations
IT security teams should update their security protocols and ensure that the most recent patches have been implemented across the network.
Invest in training for employees
Employees should be aware of the cyber risks they encounter when surfing the web. Clicking on suspicious online ads, for example, can introduce vulnerabilities into the network. More on cybersecurity awareness training.
Continuous security monitoring
Teams should strive to continuously monitor the cybersecurity posture of their law firms and other legal service providers (alongside other critical vendors) to ensure that no new threats emerge through these third parties. More on continuous monitoring.
Establish cybersecurity benchmarks
Organizations should establish security benchmarks to help them take appropriate action depending on changes in the security posture of their own organization or their critical third parties.
Discuss cybersecurity with Board of Directors
Successfully protecting an organization from cyber attacks requires a team. Organizations should add cybersecurity to Board-level discussions.
Examples of Ransomware: 7 Cyber Security Trends To Fight Back
→ Read Next: Lessons learned from Equifax Cybersecurity Hack
[/et_pb_text][et_pb_cta title=”Free Cybersecurity Training Tools” button_url=”https://www.cybriant.com/home/services/strategic/training/” button_text=”Check it out” _builder_version=”4.16″ background_color=”#0c71c3″ background_image=”https://www.cybriant.com/wp-content/uploads/2017/07/matrix-2354492_640.jpg” border_style=”solid” button_letter_spacing_hover=”0″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”0″ button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]