CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

Caroline McCauley

The Security of Cloud-Based Software and Client Communication

Cloud-Based Software Security

The fear of not having a secure cloud-based software should far outweigh the fear of switching to a new system. In fact, the longer law firms procrastinate implementing a secure cloud-based software the higher risk of ransomware they face. With an estimated 4,000 ransomware attacks occurring daily, ransomware threats are at an ultimate high.

The Economist’s “Ransomware Attacks Were on the Rise, Even Before the Latest Episode” reports the high rate of ransomware is not a recent phenomenon, but has planted its seed over the past few years; “since 2014 the varieties of ransomware have more than tripled, according to the Internet SECURITY Threat Report by Symantec, a computer-security vendor-a sign that internet bandits are catching on to the lucrative rewards it offers.”

The cyber-attacked entitled “WannaCry,” while it has received extensive press coverage and has become nearly synonymous with ransomware attacks, according to The Economist, “it is only the most recent example of “ransomware.” The Economist defines ransomware attacks as malicious programs that block access to files unless the victim pays off the hackers.” With the United States being the largest victim of ransomware of any other country, with 34% of global ransomware attacks, corporations in the United States should seek to ensure enforcement of security. It’s becoming an all-too-common scenario that hackers are demanding $10,000 plus for the return of data. With an adequate cloud-based case management system, law firms can take preventive action, before paying the costs.

Increasingly security has become a pressing and prevalent topic within the field of law. Not only is there heightened anxiety around the security of law firm’s data, but also there are concerns regarding the safety of electronic correspondences with clients. Due to the fear of security breech, many bar associations are now highly encouraging, if not coercing, law firms to send encrypted emails to their clients. While the ABA’s new ethics opinion on encryption of attorney-client email does omit the clear-cut statement of “email encryption required,” Jim Calloway in his well referred to “Law Practice Tips Blog” notes that a celebration of this absence would be “rejoicing prematurely.”

Though there is no requirement per say (which might have made for a less ambiguous ruling), the ABA strongly urges that law firms must undergo a “fact-based analysis” to determine whether “the nature of the information requires more security.” The “fact-based analysis” is not a simple check, rather the analysis is quite onerous and cannot be applied to all situations. In some circumstances, encryption is warranted. The process of encryption is arduous for both law firms and clients.

In most cases, to enact encryption additional, expensive software must be purchased, adding to the already steep cost of infrastructure. Additionally, neither law firms nor clients are not keen to use encryption as it involves layers of passwords, resulting in time-consuming security measures. Encryption can be made through an email add-in. However, this most likely requires sending tedious instructions to clients, so they can access the email. Often clients become frustrated with the complex instructions and refrain from enacting encryption. As will later be discussed, in the next section of “how to go about choosing a software provider,” a legal practice management system with a client portal allows law firms to eschew the laborious process of encryption.

Legal client portals allow law firms to forgo a “fact-based analysis” to ensure security measures and ABA standards are met. With a legal client portal, law firms can have the peace of mind that all their client information is safe and secure, without any additional evaluation needed. Legal client portals enable law firms to share even the most lengthy, sensitive case files with your clients.

LawConnect is a legal client portal that seamlessly integrates with LEAP’s practice management software. With its high-level security, LawConnect can store copies of law firm’s clients’ most valuable documents, such as insurance policies and wills, for guaranteed safe-keeping.

Three of the main advantages law firms have with LawConnect are safe documents, collaboration, and accessibility. Sending confidential documents via email, exposes law firms to hacking and ransomware attacks. LawConnect avoids the risk of email and stores data on servers provided by Amazon Web Services. Logging into LawConnect is simple and quick; users can use their Facebook, LinkedIn, or Google Accounts to access LawConnect from anywhere in the world, anytime. Collaboration is enhanced with LawConnect’s ability to share documents quickly and securely among users. Learn more on how LawConnect can provide seamless safe and secure client communication.

Sponsored Series by Leap.us

By Caroline McCauley

Caroline McCauley

Caroline McCauley is a Creative Content Strategist at LEAP, legal software. She seeks to provide information on how legal case management software can help law firms in New York, New Jersey, and Massachusetts.

View Website
The Lighter Side Of The Cloud - Self Education
The Lighter Side Of The Cloud – Google vs Microsoft
The Lighter Side of the Cloud - Procurement
Infatuation leads to love - How container orchestration and federation enables multi-cloud competition

Infatuation leads to love – How container orchestration and federation enables multi-cloud competition

Container Orchestration The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to ...
DATA SOVEREIGNTY

Data Sovereignty: the ONLY truly safe path to avoid Privacy Shield turmoil

DATA SOVEREIGNTY India is following Russia and others in imposing data sovereignty restrictions that specify that data must remain in ...
The 3% Edge: How Data Drives Success in Business and the Olympics

The 3% Edge: How Data Drives Success in Business and the Olympics

Data Drives Success in Business A recent Bloomberg BusinessWeek article entitled “The Tech Guy Building Wearables for America’s Olympians” profiles ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
How to Transform Your Operating Model for the Cloud

How to Transform Your Operating Model for the Cloud

Transform Your Operating Model It can be tough for established organizations to embrace change, so when they start working with ...
Infographic - Internet of Things (IoT) Will Be Top Technology Investment

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply way too much money at stake to ignore the potential that is going to truly ...
[Free White Paper] Global Mid-Year Threat Landscape Report > Dive into the three major threats of mid-2018

[Free White Paper] Global Mid-Year Threat Landscape Report > Dive into the three major threats of mid-2018

[Free WhiThe use of unknown or unpatched software vulnerabilities in advanced attacks is key to threat actors, as it allows them to infiltrate organizations or distribute malware en masse to vulnerable systems. Download the free white paper now to learn ...
12 WordPress Managed Hosting Services

12 WordPress Managed Hosting Services

WordPress Hosting Services WordPress hosting services has exploded in popularity as a blogging tool and content management system in recent years, and is now used by more than 23.3 percent (2018 Edit: 53%) of the top 10 million websites worldwide. Due ...
10 Prototyping Tools To Help Build Your Startup

10 Prototyping Tools To Help Build Your Startup

Prototyping Tools We are continuing this week by focusing on startup tools, tips and tweaks that will help you build, design, manage and market your way into the cloud based business that you want to be. Last week we offered a ...
Top 10 Machine Learning Algorithms

Top 10 Machine Learning Algorithms to Know

Top 10 Machine Learning Algorithms Modern advancements in Artificial Intelligence (AI) are set to change our world for the better. These developments have largely been made possible due to technologies such as cloud sharing, data analytics, blockchain, and improved computing ...
Cloud And Cybersecurity: 5 Things CISOs Need To Consider

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects ...