Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Prioritizing e-Mail Security in the Legal Sector

BY Mounil Patel
November 30, 2015

Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.

Even more disconcerting is how routine these incidents have become: hackers gain access to a company or government agency's database; they procure the personal and sensitive business information of thousands, if not millions, of people; and they either turn around that information onto the black market or keep it for their own use, putting millions of victims at risk of identity fraud or, in the case of businesses, competitive risk. And now, unsurprisingly, cybersecurity has shot up the priority list for many organizations.

We've seen such a shift occur in the legal market. Up until about three years ago, the chief IT issue that law firms struggled with was an overabundance of e-mail. It's not an exaggeration to say that e-mail is the lifeblood for law firms and many other service industries; it's what enables attorneys to remain in quick and constant contact with their clients and paralegal teams, whether in the office, on the road or in court. With that comes bloated e-mail inboxes that need streamlining and proper archiving in order for more efficient use. But more recently, law firms have been gradually shifting their emphasis from e-mail volume to e-mail security as their top IT priority, largely for two reasons.

Read These Next
Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models Image

Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.

Hyperlinked Documents: The Latest e-Discovery Challenge Image

As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.

Identifying Your Practice's Differentiator Image

How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.

Risks and Ad Fraud Protection In Digital Advertising Image

The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.

Turning Business Development Plans Into Reality Image

This article offers practical insights and best practices to navigate the path from roadmap to rainmaking, ensuring your business development efforts are not just sporadic bursts of activity, but an integrated part of your daily success.