{"id":781,"date":"2020-03-09T06:19:01","date_gmt":"2020-03-09T06:19:01","guid":{"rendered":"https:\/\/techlaw.co.il\/en\/?p=781"},"modified":"2020-03-09T06:27:16","modified_gmt":"2020-03-09T06:27:16","slug":"cybersecurity-and-law-how-to-use-technology-in-our-favor","status":"publish","type":"post","link":"https:\/\/techlaw.co.il\/en\/cybersecurity-and-law-how-to-use-technology-in-our-favor\/","title":{"rendered":"Cybersecurity and Law: How to Use Technology in Our Favor?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"781\" class=\"elementor elementor-781 elementor-bc-flex-widget\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73f323a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73f323a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-432b7ba\" data-id=\"432b7ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a81aa elementor-author-box--layout-image-left elementor-author-box--align-left elementor-widget elementor-widget-author-box\" data-id=\"c6a81aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/techlaw.co.il\/en\/wp-content\/uploads\/2020\/03\/TechLaw-round-300x300.png\" alt=\"Picture of  Daniela Spanier\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\t Daniela Spanier\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-316be28 elementor-widget elementor-widget-text-editor\" data-id=\"316be28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\"><span style=\"color: #000000;\">As we know, technology is increasing and moving forward and faster everyday. This is a great opportunity for us to live in \u201cThe Digital Era\u201d.\u00a0<\/span><span style=\"color: #000000;\">It is really interesting how all the new methodologies and applications are becoming more and more common everyday and how they minimize our problems by saving us energy, time and money in different areas.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">While technology is growing faster and making our lives better &#8211; so is the use of technology by people with malicious purposes, such as attacking our devices with different kinds of Cyberattacks.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Our focus in this article will be about the <strong>prevention<\/strong> of cyber-attacks &#8211; by implementing Cybersecurity, and more specifically &#8211; what is the status about <strong>Cybersecurity in Law Firms<\/strong>.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Cyber Security is defined as the practice of protecting systems, networks and programs from digital attacks. This Cyberattacks are usually aimed at:<\/span><\/p><ul style=\"text-align: justify;\"><li><span style=\"color: #000000;\">Accessing, changing, or destroying sensitive information;<\/span><\/li><li><span style=\"color: #000000;\">Extorting money from users;<\/span><\/li><li><span style=\"color: #000000;\">Interrupting normal business process;<\/span><\/li><li><span style=\"color: #000000;\">And so forth<\/span><\/li><\/ul><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. There are different kinds of CyberAttacks: Phishing, Ransomware, Malware and Social Engineering.<\/span><\/p><ol style=\"text-align: justify;\"><li><span style=\"color: #000000;\"><strong>Social Engineering: <\/strong>act of tricking someone into giving relevant information or taking action usually through technology. The idea behind this is to take advantage of a potential victim.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Phishing:<\/strong> the most common type of Social Engineering, usually used by sending fraudulent emails that seemed to be from reliable sources. This is the main cause of a breach in the security of people\u2019s email. The email may trick the victim into clicking a URL link, which then asks for a password to an online service.\u00a0This is the principal attack that lawyers suffer because they may have all their clients\u2019 relevant information in their mailboxes. One of the first things to do after such attacks is to change the passwords associated with email addresses and online tools and connect to email accounts. Lawyers can help protect them through education or a technology solution that filters malicious emails.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Ransomware<\/strong>: happens when hackers lock down files until the ransom is paid. Paying the ransom does not guarantee that the files will be retrieved.<\/span><\/li><li><span style=\"color: #000000;\"><strong>Malware: <\/strong>software specifically designed to gain access or damage a computer without the knowledge of the owner.<\/span><\/li><\/ol><p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><u>Law Firms and Cybersecurity<\/u><\/strong><\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">One of the most important things in the attorney-client relationship is that it cannot exist without confidentiality and privacy &#8211; that\u2019s why the protection of sensitive communications and information is vital in the legal profession.\u00a0<\/span><span style=\"color: #000000;\">In the particular case of law firms, it is important for them to keep the amount of sensitive information digitally stored a minimum and take all the precautions that are needed to avoid these type of attacks.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Law firms are the prime targets for Cyberattacks because, first of all, they not only keep some of the world\u2019s most valuable secrets and the most relevant information of very important clients &#8211; but also are also regularly emailing attachments to clients, providing possible means to get into their system.\u00a0<\/span><span style=\"color: #000000;\">On the other hand, they have had historically weak defenses and are seen as capable of paying large sums of money.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">There are many kinds of attacks, but there are also many ways in which Law Firms can avoid them. It is recommended to the firms to be preventive and rather to be strict in their security methods than to be hacked and let the attackers profit from their sensitive, non-public information.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>There are different ways in which lawyers may protect their private information<\/strong>. They may also be aware of their risks through security assessments and penetration testing. This includes external tests to see what part of the system is vulnerable on the Internet, testing the vulnerabilities in web and mobile applications.\u00a0<\/span><span style=\"color: #000000;\"><strong><em>Prevention<\/em><\/strong> is about managing risk, and security assessments take a comprehensive look at what\u2019s missing in a law firm\u2019s IT security and help lawyers identify risk.<\/span><span style=\"color: #000000;\"><strong>\u00a0<\/strong><\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Specialists recommend to have a plan before an attack happens, to be preventive, this is because when you are going through an attack, if you don\u2019t have a plan, the firms will waste crucial hours wondering what to do, who\u2019s job is to solve it, what are the best companies that can solve this type of problems.\u00a0<\/span><span style=\"color: #000000;\">The firsts minutes after a breach are crucial, and a lot of important tasks must begin immediately. Getting the help a firm needs at the right time is crucial because companies that are attacked are judged by their response.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Another important fact is that lawyers have decades of information stored, so to be more diligent &#8211; Law Firms must determine which is the most essential to protect (it cannot be always 100% safe, but they can take steps to protect themselves), and don\u2019t retain what they don\u2019t need or at least move it to an archive that is much less accessible.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">Moreover, Firms must pay specific attention to their contracts with their clients because sometimes, some clauses include obligations to delete the data once they finish with the representation, and in most of the cases this not realistic because of the way in which data backups work.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">According to the 2016 ABA Technology survey, only 17.1% of all law firms have an incident response plan in place to address a security breach and only 50% of firms of 500 lawyers have such a plan in place.\u00a0<\/span><span style=\"color: #000000;\">The reality is that Law Firms aren\u2019t prepared for a major breach.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><u>Ethics for law firms \u2013 crucial element<\/u><\/strong><\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">The ethical obligation is a very important issue due to what\u2019s the role of the lawyer in case their device gets attacked. The matter of whether to notify their clients of what happened or not. The conclusion of most people that studied the subject is that it is ethically correct to share with the client about the problem.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">It\u2019s relevant to share the information and the problems that Law Firms lead everyday, all the attacks that they suffer. Not only with clients, but also with partners, colleagues and the companies in general. Sharing information means hackers will have success only once or very few times. But sharing is a very efficient way to prevent these attacks.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">The pressure from clients is causing firms to invest and focus on cyber risk, they are demanding a high level of security, most of all in their contracts, when they are hiring a lawyer, they need to be sure that their information will be confidential and protected.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">According to the 2016 ABA Legal Technology Survey Report, 30.7 percent of all law firms and 62.8 percent of firms of 500 lawyers or more reported that current or potential clients provided them with security requirements. This push from clients is causing law firms to jump into the expanding world of cybersecurity.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><u>What to do?<\/u><\/strong><\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">In conclusion, we can assure that it\u2019s much more difficult to deal with the Cyber Attack when this happens, than be preventive and take all the precautions that exist to try to win this battle. If it is needed, charge an extra fee to your client, and hire the best type of cybersecurity system.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">As stated before, it is also very important to settle down in every contract the real information and to be very clear about the risks that may exist. So if, eventually, a cyber attack happens, you will still have to solve the attack problem, but you won\u2019t be sued by your client because of lack of information or bad diligence.<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\">For any attorney\u2019s reputation, it\u2019s crucial to be diligent. This is because sometimes, there\u2019s an attack and you couldn\u2019t do anything to prevent it, but it would really change your reality if you used all your resources to prevent them. \u00a0<\/span><\/p><p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><u>Popular cyber Cases<\/u><\/strong><\/span><\/p><ol style=\"text-align: justify;\"><li><span style=\"color: #000000;\">One popular case happened in July 2016 where Malwere infected Jessica Mazzeo and Fran Griesing the computer system from their Philadelphia Firm of 12 lawyers.<\/span><\/li><li><span style=\"color: #000000;\">Panama City: Panama Papers-More than 11.5 documents from the Panama- based law firm mossback Fonesca were leaked to the public.<\/span><\/li><li><span style=\"color: #000000;\">New York City: Cravath\/Well- On March 29, 2016, the Wall Street Journal reported that hackers had broken into the files of some of the biggest law firms in an insider-trading scheme that involved planned mergers.<\/span><\/li><li><span style=\"color: #000000;\">Worldwide: Oleras- In February 2016, an alert went out to 46 law firms in the United States and two law firms in the U.K. that Ukraine-based hacker Oleras was advertising phishing services on a Russian Website.<\/span><\/li><li><span style=\"color: #000000;\">London: Thrity Nine Essex Street- On Feb 24 and 26, 2014, the U.K. firm Thirty Nine Essex Street was cyber- attacked, Booz Allen Hamilton a technology consulting firm, reported that the attack was most likely from the Russian state-sponsored group Energetic Bear. This group is linked to hacking utility companies in the United State and Europe in 2014.<\/span><\/li><li><span style=\"color: #000000;\">Toronto: Trust Account- In December 2012, a Toronto-based law firm was hit with a computer virus, which stole a six figure amount from the firm\u2019s trust account. The hackers installed a Trojan horse virus to get access to passwords to the firm\u2019s bank accounts.<\/span><\/li><li><span style=\"color: #000000;\">Washington, D.C: <strong>Wiley Rein<\/strong>\u2014Also in 2012, Wiley Rein, one of the largest law firms in Washington, D.C., was hacked, most likely by Chinese state-sponsored operatives. According to Bloomberg News, the hackers wanted information related to SolarWorld, the German-based manufacturer that produces solar panels. SolarWorld\u2019s computers were hacked at about the same time.<\/span><\/li><\/ol><p style=\"text-align: justify;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As we know, technology is increasing and moving forward and faster everyday. This is a great opportunity for us to live in \u201cThe Digital Era\u201d.\u00a0It is really interesting how all the new methodologies and applications are becoming more and more common everyday and how they minimize our problems by saving us energy, time and money [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":785,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[28,19,14],"class_list":["post-781","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-proffesional-articals","tag-cyber-security","tag-israeli-legal-tech","tag-legaltech"],"_links":{"self":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/comments?post=781"}],"version-history":[{"count":6,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/781\/revisions"}],"predecessor-version":[{"id":792,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/posts\/781\/revisions\/792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/media\/785"}],"wp:attachment":[{"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/media?parent=781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/categories?post=781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techlaw.co.il\/en\/wp-json\/wp\/v2\/tags?post=781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}