how oklahoma law firms protect client data (slideshare)
TRANSCRIPT
Courtesy of Emsco Solutions
http://www.ITSecurityforOKCLawyers.com
How Oklahoma Law Firms
Protect Client Data
Sponsored by http://www.ITSecurityforOKCLawyers.com
Oklahoma law firms handle
highly sensitive information
on a daily basisRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Intellectual property details
Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Confidential trade secrets
Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Client personal and
privileged informationRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Case-related financial
and medical information Ron Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Recently publicized
data breaches emphasize
the critical importance
of reliable and effective
data securityRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
As a result of potentially
catastrophic breaches
like this,Ron Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
updated ethics standards
require Oklahoma lawyers
to take reasonable steps
to ensure that client data
remains safeRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Require Two-Factor
AuthenticationRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Two-factor authentication
provides an extra layer
of security to privileged
administrator accountsRon Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Other recommended
authentication controls
include:Ron Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Blocking users who log in
from countries where the
firm does not conduct
business Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
• Blocking login attempts
that originate from
anonymous networksRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Implement Real-Time
Security DefensesRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Criminals often use
targeted emails to break into
protected networks, a ruse
known as ‘spear phishing'Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Law firms have set up
security gateways that
provide real-time protectionRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Upgrade Database
Security ControlsRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Oklahoma law firms have
upgraded security controls
to limit access to their
databases,Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
encrypt stored files, and
instantly patch any detected
vulnerabilitiesRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Establish an Employee
Awareness ProgramRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Law firms are educating
their staff to recognize
fraudulent communications
and websites,Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
refrain from putting
confidential data onto
portable items that are
easily lost (jump drives),Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
and confine all confidential
communications to within
the company firewallRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Hire a Specialist Security
Services ProviderRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
A security services provider
can deliver contract-based
assistanceRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
that is less expensive
but no less effectiveRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Bottom Line
Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
ABA Model Rule 1.6. (c)
states that lawyers must
make “reasonable efforts”
to prevent client information
from being compromisedRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Employee awareness and
strong security controls will
put them in an excellent
position to withstand most
dangersRon Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Does your firm use any
security measures not
included in this article?Ron Vaughn
Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
If so, what are they?
Ron Vaughn Solutions Specialist
Sponsored by http://www.ITSecurityforOKCLawyers.com
Let us know your thoughts
in the Comments box belowRon Vaughn
Solutions Specialist
Copyright © Emsco Solutions
Is Your Oklahoma Law Office’s Network
Security the Best it Can Be?
Download Your Free
IT Security Checklist for
Oklahoma Law Firms
Now at http://www.ITSecurityforOKCLawyers.com