Information Governance: Law Firms' Cybersecurity Weak Spot

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

, Legaltech News

   | 2 Comments

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Continue to Lexis Advance®

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at customercare@alm.com

What's being said

  • charles.reid@crassoc.biz

    I can only speak to email but Using IBM Lotus Notes is the only way to avoid your email from being hacked, There are more then 9 layers of security over each email transaction. Server, Workstation, User security measures. Why experts don‘t tell the Business public that Notes is protected and Exchange is just plain SMTP text email is beyond me.

  • Kent Henderson

    70% of the paper in a law firm, and everyone knows that there is A LOT of paper in every law firm, is a duplicate of that which already exists in their Document Mgmt System. Simply, it exists on paper because somebody chose to print it. You have a digital fortress around your data, and in about 2 simple clicks, it all goes out the door. Strategies that aren‘t serious about ink-on-paper are strategies with massive gaps. docsolid.com. We‘ve considered this problem and built the strategy to address it if you agree to the problem.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1202783730424

Thank you!

This article's comments will be reviewed.