Today, security is top of mind for many in the legal profession. The EU’s GDPR, now one-year-old, certainly grabbed our attention and California’s similar CPPA, set to take effect early next year, has increased awareness. While the news has extensively covered major data breaches, it is easy for lawyers, law firms, in-house counsel, and their staffs to dismiss exposure to those occurrences because we typically do not collect large volumes of data in our day-to-day practices.
In his 3/8/17 article, “Rising cost of data breaches to $2.1 trillion by 2019…” Luke Irwin of IT Governance ominously wrote: “[We] found an astounding figure of 3.1 billion records leaked in 2016, conservatively. We also discovered an infiltration of law firms’ email worth $4 million stolen [and] data breaches anticipated to be at 2.1 trillion by 2019, in less than 2 years from now.”
In an article by Victoria Hudgins, writing for LegalTechNews.com, “Sink or Swim: Law Firms Need to Leverage, Understand Tech to Survive,” stated, “For law firms and their in-house partners to survive and thrive, differentiating services and analyzing big data will be key, while understanding and harnessing technology are the first big steps, according to a Wolters Kluwer survey.”
In his an article earlier this year for Law Journal Newsletters, “’Dark Overlord’ Hack Shows Mounting Cyber Risks for Law Firms” law firm global strategy and economics writer Dan Packel reports on a law firm’s worst nightmare: potentially becoming the weak link in a global extortion plot related to the 9/11 World Trade Center attacks.
Jason Tashea’s 1/10/19 article in the ABA Journal online, “How to redact a PDF and protect your clients,” further affirms the dangers of legacy software, underestimating technology risk, and mindset; yet it fails to identify current Infosecurity software solutions.
Louise Matsakis’ 1/9/19 article in Wired, “Paul Manafort Is Terrible with Technology,” and L.V. Anderson’s 1/8/19 article in Digg, “Lawyers File Response to Mueller Claims, Accidentally Fail to Properly Redact The Secret Stuff,” eloquently converge to illustrate the dangers of legacy software and mindset.