Stay up-to-date with the latest developments in securities law through access to both news and all statutes and regulations. Find relevant corporate filings through a searchable EDGAR database. And...
Law firms continue to struggle with cybersecurity internally, even as the breaches of Hillary Clinton’s campaign chairman’s email account during the recent presidential election provided a potent reminder of the perils of weak security.
Big Law firms are the most vulnerable: An ABA survey shows that twenty-six percent of firms with 500 or more attorneys who responded to the survey experienced a security breach in 2016.
These breaches are part of an upward trend in Big Law. In 2014, 10 percent of large law firms who responded to the survey experienced a security breach and in 2015, the number shot up to 25 percent.
Although there is increased awareness about cybersecurity threats, firms have been unable to chip away at the incidences of security breaches.
Fourteen percent of all law firms responding to the survey experienced a security breach in 2016 and this rate has remained steady for the past four years, according to a ABA report on the survey.
This number is lower than in some industries, but law firms are in a unique and potentially more dangerous situation.
The combination of several factors make law firms particularly vulnerable to attack. They must take a number of necessary steps to safeguard their information and protect against lawsuits, cybersecurity professionals told Bloomberg BNA.
Law firms are “archaic institutions” with outdated software and very sensitive data that is valuable to many different actors, Christopher L. Dore, an attorney with Edelson PC, Chicago, told Bloomberg BNA.
Often, those in control of the software aren’t technologically savvy, making the firms ripe for an attack, Dore said. Dore’s practices focuses on emerging consumer technology and privacy issues.
“Law firms have to recognize that they hold information on behalf of clients” that’s “a treasure trove of information for criminals, competitors and nation-states,” Alan Cohn, an attorney with Steptoe & Johnson LLP , told Bloomberg BNA.
Cohn’s areas of practice include cybersecurity, privacy and national security.
The firms are therefore a “highly attractive target for those entities,” he said.
K2 Intelligence is “is an industry leading investigative, compliance, and cyber defense services firm,” according to its website.
There are a range of adversaries out there, Lawlor said.
For instance, “there are those who are looking to immediately monetize their access to your data,” he said.
They might sell it to another criminal actor; encrypt the data until you pay or blackmail you by threatening to release the data, Lawlor said.
There are also “sophisticated actors” who have motives that go beyond the physical theft, Cohn said.
Other motives include political embarrassment and destabilization of trust in public officials, such as what happened with Mossack Fonseca, Cohn said.
Hackers leaked documents in 2016 revealing that the firm helped thousands of people, including politicians and public figures, set up “off-shore” companies to hide their wealth and evade taxes.
Stealing intellectual property to manufacture the same technology overseas more cheaply and undercut the prices of the technology’s originators is another more sophisticated motive, Lawlor said.
“There need to be procedures, practices and training in place to educate all employees” about the threats law firms face and what they need to do when a breach occurs, he said.
Adversaries can attack via two routes: outdated technology and spear phishing, Lawlor said.
Spear phishing is a targeted method to gain access to a person’s confidential data via a spoofed e-mail.
A spoof is the use of falsified data such as a forged sender address to masquerade as someone else to gain unauthorized access to a computer system or data.
Lawlor described how an adversary might initiate a hack.
“The first thing an adversary will do is scan your network for easy ways in,” he said.
“If you have unpatched software,” that is, outdated software, then that’s their entry method, Lawlor said.
These are “huge, huge vectors for attacks,” he said.
According to Cisco Systems, Inc.'s 2016 Annual Security Report, 92 percent of Cisco devices on the Internet are running software with known vulnerabilities.
“Aging infrastructure is growing and leaves organizations increasingly vulnerable to compromise,” the report said.
Cisco develops, manufactures and sells technology services and products.
Law firms “have to assume there are vulnerabilities in their systems,” Cohn said.
Even if they’re able to patch all known vulnerabilities, they are subject to advanced threats because of the nature of the information they hold, he said.
Law firms maintain “incredibly sensitive client information” and hold in high regard their reputations and ability to maintain privacy, which makes them such attractive targets, Lawlor said.
What’s a firm to do?
For starters, law firms must have a strong perimeter security program in place, Lawlor said.
Firms without this type of program could be exposed to liability, even if no data has been compromised.
No claim has been made that information was stolen.
The firm’s unpatched security system nevertheless put client information at risk, the complaint says.
The suit hit a roadblock Feb. 22 when a federal district court judge ruled that claims had to be heard individually in arbitration, not as a class.
“The industry is notoriously behind the times and is unregulated in terms of security,” Dore said.
Dore is an attorney with Edelson PC, which represents the plaintiffs in the Johnson & Bell lawsuit.
To avoid exposing client information, a strong perimeter security program must be in place with several components, Lawlor said.
Even with these measures in place, adversaries will try another approach to breach a firm’s security, he said.
In that case, “the easy way in is through your people,” Lawlor said.
This includes a method like spear phishing.
Spear phishing can happen when an actor either spoofs an e-mail address or compromises a personal e-mail account, enabling him or her to send e-mails directly from that account, Lawlor said.
Once a spear phishing victim opens the phony e-mail, they are compelled to do something, like click on a weaponized link, which injects malware onto their computer, he said.
Malware is software intended to disable or damage computer systems.
At a typical company, about 12 percent of employees will try to click on such a link, Lawlor said.
“The best security measure against spear phishing is prevention,” Lawlor said.
This includes assessments and training, he said.
Firms should get quarterly cyber-risk and vulnerability risk assessments “for ever,” Lawlor said.
Lawlor recently conducted such a test for a client and “we found dozens of devices on a client’s network that they didn’t know they had,” he said.
Firms must do “due diligence to know all the assets under” their roofs and “make sure they are protected,” Lawlor said.
There has to be a plan in place for the eventuality that a breach will occur, Lawlor said.
An incident response plan must:
Understanding the threats will also help protect your firm, Cohn said.
Information sharing arrangements such as ones offered by the Legal Services Information Sharing & Analysis Organization are a step in the right direction, he said.
By sharing their information, LS-ISAO members provide “threat indicators” for the organization’s analysts to research, which can lead to “actionable intelligence for dissemination,” according to the group’s website.
The costs a large law firm can expect to incur to update its security and then maintain it aren’t small but they don’t compare to those that result from a system breach, Dore said.
It might cost several hundred thousand or even $1 million to maintain a system but that’s “a heck of a lot smaller than the risk,” he said.
After a breach, a firm can expect long-term costs to include the loss of dozens of clients and there’s a potential for “massive malpractice claims,” Dore said.
To contact the reporter on this story: Melissa Heelan Stanzione in Washington at firstname.lastname@example.org
To contact the editor responsible for this story: Jessie Kokrda Kamens at email@example.com
Copyright © 2017 The Bureau of National Affairs, Inc. All Rights Reserved.
All Bloomberg BNA treatises are available on standing order, which ensures you will always receive the most current edition of the book or supplement of the title you have ordered from Bloomberg BNA’s book division. As soon as a new supplement or edition is published (usually annually) for a title you’ve previously purchased and requested to be placed on standing order, we’ll ship it to you to review for 30 days without any obligation. During this period, you can either (a) honor the invoice and receive a 5% discount (in addition to any other discounts you may qualify for) off the then-current price of the update, plus shipping and handling or (b) return the book(s), in which case, your invoice will be cancelled upon receipt of the book(s). Call us for a prepaid UPS label for your return. It’s as simple and easy as that. Most importantly, standing orders mean you will never have to worry about the timeliness of the information you’re relying on. And, you may discontinue standing orders at any time by contacting us at 1.800.960.1220 or by sending an email to firstname.lastname@example.org.
Put me on standing order at a 5% discount off list price of all future updates, in addition to any other discounts I may quality for. (Returnable within 30 days.)
Notify me when updates are available (No standing order will be created).
This Bloomberg BNA report is available on standing order, which ensures you will all receive the latest edition. This report is updated annually and we will send you the latest edition once it has been published. By signing up for standing order you will never have to worry about the timeliness of the information you need. And, you may discontinue standing orders at any time by contacting us at 1.800.372.1033, option 5, or by sending us an email to email@example.com.
Put me on standing order
Notify me when new releases are available (no standing order will be created)