Upload
nikec-solutions
View
369
Download
1
Tags:
Embed Size (px)
DESCRIPTION
As competition within the legal environment intensifies, law firms are constantly looking for ways to differentiate their services. While many consider their reputation as their greatest asset that took years to build, there are a few key elements that underpin this, one of which is security. It is this robust security that can prevent issues such as data breaches which in turn will destroy your reputation at the snap of a finger. It is not only the law firms who understand the need for data protection and security, clients and consumers are becoming much more savvy and are realising that they too, need to protect their own. With newspapers filled with stories of hackers attacking large multinational companies and mobile devices with sensitive data being lost or stolen, security is fast becoming a top priority for most businesses today. Here are 3 ways to secure your law firm’s information and reputation
Citation preview
www.nikecsolutions.com
3 Ways to Secure Your Law Firm’s
Information and Reputation
www.nikecsolutions.com
www.nikecsolutions.com
Introduction
• As competition within the legal environment intensifies, law firms are
constantly looking for ways to differentiate their services.
• While many consider their reputation as their greatest asset that took
years to build, there are a few key elements that underpin this, one of
which is security.
www.nikecsolutions.com
• It is this robust security that can prevent issues such as data breaches
which in turn will destroy your reputation at the snap of a finger.
• It is not only the law firms who understand the need for data protection
and security, clients and consumers are becoming much more savvy and
are realising that they too, need to protect their own.
Introduction
www.nikecsolutions.com
• With newspapers filled with stories of hackers attacking large
multinational companies and mobile devices with sensitive data being
lost or stolen, security is fast becoming a top priority for most
businesses today.
Introduction
Here are 3 ways to secure your law firm’s
information and reputation
www.nikecsolutions.com
Secure your Workflow Environment
1. Secure your Workflow
Environment
www.nikecsolutions.com
As the mobile workforce expands, sensitive documents now need to be
created, shared, stored and printed both in and outside of the office.
Security measures should be applied throughout the different document
processes within a firm’s workflow as this information travels. This includes:
• Data encryption
• Limiting access to sensitive data
• Secure scanning and printing
• Internet endpoint security
1. Secure your Workflow Environment
www.nikecsolutions.com
Data encryption
• Each laptop, tablet, mobile phone and other printing and file sharing
device that is connected to the corporate network brings some security
risks. And with the growing numbers of devices, firms should encrypt
their documents at all stages of the workflow whether the data is at
rest or is in transit.
• Encryption can - and should - be applied to data when it is stored in the
user’s hard drive, or when it is sent to a printer, scanned to an email
exchange server or to a Cloud based file storage system, or even when
uploading and downloading to and from a mobile devices.
1. Secure your Workflow Environment
www.nikecsolutions.com
Limiting access to sensitive data
• To avoid sensitive information being disclosed, permissions within files
and folder settings should be changed, allowing access to only those who
are authorised.
1. Secure your Workflow Environment
www.nikecsolutions.com
Secure scanning and printing
• Many printers and scanners use ‘pull printing’ to force users to
authenticate themselves before releasing a document.
• This is done by entering a pin code or using a smartcard and ensures that
confidential documents are not accidentally retrieved by unauthorised
colleagues, or left abandoned on the printer.
1. Secure your Workflow Environment
www.nikecsolutions.com
Internet endpoint security
• With the increase in devices connecting to the corporate network, an
endpoint security solution protects firms from viruses and hackers and
helps IT departments monitor, control and moderate how or what
information employees receive, send or access through the internet.
• This management tool helps create feasible policies and guideline based
around internet access, blocked websites, application and the use of social
media in the workplace.
1. Secure your Workflow Environment
www.nikecsolutions.com
Secure your Workflow Environment
2. BYOD, Mobility & Security
www.nikecsolutions.com
• The trend of mobile workers using their own devices (BYOD) is rising.
• Employees store documents on consumer Cloud based applications
which are not always secure but conveniently provides access to
documents at all time from outside the office.
• However, it is the fact that these documents now reside outside of the
corporate firewall and well out the law firm’s control that is the cause
for concern.
2. BYOD, Mobility & Security
www.nikecsolutions.com
• Secure file sharing technologies allow encrypted files to be stored, shared
and accessed on mobile devices.
• It acts as a back-up for important documents within an environment that
the IT team is in full control of.
• There are varying grades of security from basic SSL to high end military
grade level, but the minimum that a law firm should considered is an ISO
27001 accredited server which conforms to industry best standards when it
comes to information security management.
2. BYOD, Mobility & Security
www.nikecsolutions.com
• Encrypted data when data is transferred how do you guard against security
threats? File encryption technology can automatically and transparently
encrypt files and folders placed on file servers and can only be read and
modified by those who have an encryption key.
2. BYOD, Mobility & Security
www.nikecsolutions.com
• Remote Wipe data if a device is lost or stolen, the data contained within can
be wiped immediately.
• IT teams also gain centralised and granular level control of data and set
rules to restrict certain users accessing highly sensitive documents.
2. BYOD, Mobility & Security
www.nikecsolutions.com
Secure your Workflow Environment
3. Internal & External
Communications
www.nikecsolutions.com
Internal communication
• Law firms need to assess and prioritise the risks that they face and establish a
strategy for their security requirements, which can then be implemented.
• However to execute this successfully, education and enforcement of measures,
guidelines and policies internally is an absolute must.
• It only takes a single rogue device to spread malware through the corporate
network.
3. Internal & External Communications
www.nikecsolutions.com
External communication:
• Cases of clients proactively asking law firms to demonstrate their security
measures and procedures as part of the tender process are becoming more
common.
• A recent example includes a global banking institution that holds sensitive
customer information that undertook an audit to evaluate the law firm’s
security procedures.
3. Internal & External Communications
www.nikecsolutions.com
• Therefore if a law firm can show their clients that they comply with ISO 27001
standards or have transparent internal processes with a tight hold on security,
this should be communicated through client newsletters, pitch and tender
documents and other sales and marketing material.
3. Internal & External Communications
www.nikecsolutions.com
• Employee mobility is on the rise, by the end of 2013 PC shipment will decline
by 10.6% and tablet shipments will increase by 67.9% (Gartner).
• The mobile revolution and inherent security issues can therefore no longer be
ignored as mathematically more mobile devices will filter through the
corporate network.
• Employees will increasingly use consumer devices if there is a lack of
education, control and technologies that support the way they work.
• Combined with the rise in cybercrime law firm need to jump on the security
bandwagon to make sure employees, clients and their data are protected
within the realms of a secure law firm.
Conclusion
www.nikecsolutions.com
Nikec Docstore is an application designed for professionals which allows storing any type of file,
accessing them remotely from a computer or an iPad and sharing them with authorised colleagues
or clients. By combining ease of use and the level of security required in the exchange of working
and sensitive documents Nikec Docstore is ideal for mobile professionals and collaborative work. Plus
the application is available on premise or in cloud (SAAS), so you always keep full control of your
documents. For more information, please visit: www.docstorepro.com
www.nikecsolutions.com
Copitrak is a reference solution in cost recovery and expense management. Copitrak ensures clients
can effortlessly improve cost control and maximize recharge rates. From printing and scanning
activities Copitrak Scan provides routing and OCRing capabilities, all of which are geared to deliver
100% payback within a few months. Visit Copitrak page
www.nikecsolutions.com
For more information please visit www.nikecsolutions.com
Address:
52-54 Gracechurch Street,
London, EC3V 0EH
Contact numbers:
Tel: +44 (0) 20 7621 2350
Fax: +44 (0) 20 7621 2360
Email:
Contact