Multiple Devices. Multiple Breaches?
Remember when a lawyer would join a firm and be issued a sanctioned Blackberry and laptop? Well, those days are over. Take a look at any given law firm and you’ll see lawyers pecking at smart phones, tablets and ultrabooks – all devices that they personally own and all potential security threats.
Say hello to BYOD (Bring Your Own Device.)
The complexities of BYOD multiply ten-fold in the legal environment. Is the device equipped with standard security software and protocols? Are communications properly protected from unauthorized views? How long does a document stay on a mobile device and it is secured the entire time? Is the user turning to unsanctioned freeware for mobile sharing and collaboration?
The list can go on and on and it is especially deterring when you consider that, beyond potential data breaches, unsecured communications and practices can contribute to noncompliance with federal regulations such as HIPAA (which protects and sets standards for the transmission of personally identifiable information) and state privacy regulations – which can lead to steep fines and damage to a law firm’s reputation.
If this isn’t on your radar, it should be soon. A recent Cisco study found that, by 2014, the average number of connected devices per knowledge worker is expected to reach 3.3 by 2014. That means 3 times more of a challenge to law firm security.
How can you get ahead of BYOD security concerns? Start by reading this ILTA Peer to Peer article – Making BYOD Work in a Legal Environment - which outlines basic concerns and steps to take to secure your BYOD network.