Not All Clouds Are Equal: Select the Best

By now, you’ve heard all about the cloud, how it can keep your data secure, and how using a cloud environment is a more convenient way to work. You’re convinced that working in a cloud environment is the way to go. What’s the next step? How do you get the cloud and make it work for you? Will any cloud do?

As with any other technology, you must be selective. Choose the cloud environment that provides security and support.

Legal Workspace goes way beyond providing just cloud storage for lawyers. Its cloud environment was designed with the particular needs of the legal profession at its forefront. Because of that, Legal Workspace’s cloud environment – and its set-up and support team – provide special features that make it the best choice.

A dedicated team

When you work with Legal Workspace, you aren’t just buying space and an interface. You get to work with a dedicated team that is there to help you with your technology needs. This team is made up of people with legal industry experience.

That legal industry experience allows the team to immediately comprehend and meet your firm’s needs. The team takes an unbiased approach to hosting, and they understand a law firm’s daily workflow in addition to all of the facets of technology. For example, they can help you customize programs and applications for greater efficiency. Beyond that, if you ever need advice as you make technology decisions, the team can contribute CIO-level guidance.

And, certain aspects of tech maintenance become invisible. Just think: You will never need to worry about updating software again – because it will happen automatically.

 

A secure environment

You have your dedicated technology team to set up and maintain your own distinct cloud environment when you work with Legal Workspace. But that’s not all your team can do for you. You can consult with your team about security, too. Because Legal Workspace is designed specifically for use by those in the legal profession, it has developed and locked in place a multi-layer defense system to protect your – and your clients’ – data from exposure.

Legal Workspace uses two-factor authentication, advanced intrusion detection and prevention systems, state-of-the-art antivirus software, and anti-spam solutions as tools in its mission to keep your data safe. The security teams at Legal Workspace are always working to keep your data secure with proactive monitoring, redundancy, and airtight training and policies.

 

A compliant mindset

Legal Workspace takes security and compliance seriously. It knows how important compliance is to you and to your clients. That’s why on-staff security and compliance experts are easy to reach and at the ready to help you make compliance decisions and meet the demands of standards required by the Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry Data Security Standards (PCI DSS).

And, data storage isn’t a mystery with Legal Workspace. Your data is stored in the United States – in Dallas, TX, and Denver, CO – and it will never leave those locations.

When you work with a cloud solution that understands the challenges the legal profession faces, you have the opportunity to take advantage of its expertise. You can work in a cloud environment designed especially for law firms, and you can work with teams with legal industry experience and technology expertise. That makes it so much easier to set up a cloud environment that does what you need it to do.

 

Should Responsible Law Firms Use Cloud Storage?

Protecting privilege is one reason law firms have been hesitant to adopt using the cloud for document storage and sharing. Fears of hacking or inadvertently providing access to privileged documents have kept many firms from embracing technology that could save them time and money.

Most tech-savvy law firms have taken precautions and put protocols in place to secure client documents and communications as they’ve upgraded to cloud sharing. However, some firms have been lax in their safeguarding procedures — which means their clients were left unprotected.

Unprotected file-sharing

 You’ve likely heard of file-sharing options such as Box, Google Docs, OneDrive or Dropbox. Free cloud storage options like these allow users to access documents from any device and to share files by creating custom URLs. They’re convenient, and — when used properly — can be a secure way to share information.

A problem arises when users take shortcuts or don’t take advantage of all of the security features available in cloud storage and sharing systems. That’s what happened with Harleysville Insurance Co. v. Holding Funeral Home. Harleysville’s counsel shared privileged information via Box, using its feature that creates direct links — and they didn’t password-protect the links. That meant that anyone who had access to the link could see the files. As a result, the defendant’s counsel was able to access this information.

A Virginia magistrate recently ruled that the plaintiff’s law firm’s actions “were the cyber-world equivalent of leaving its claims files on a bench in the public square and telling its counsel where they could find it.” In other words, its failure to password-protect and otherwise secure those files waived privilege.

Use the cloud safely

 This ruling doesn’t mean that law firms should discontinue cloud usage. Rather, it emphasizes the importance of putting security measures in place to block access and uphold attorney-client privilege.

Here are some ways to keep your data in the cloud secure:

1. Require log-ins (on both sides of the fence—attorneys and clients) to gain access to shared information.

2. Keep access contained. Only permit a select few team leads to share information with additional parties.

3. Some programs have a “notify when accessed” feature. Using this feature tells the content owners how and when the information has been accessed — so if there is unauthorized access, you’ll know about it right away.

4. Put an expiration date on the shared information. It’s better to re-share the information than to let it dwell on the internet in perpetuity.

Legal Workspace recommends that law firms use document management and file-sharing programs created specifically for law firms such as iManage, NetDocs, Citrix Sharefile and Egnyte. That way, you know the technology was created with attorney-client privilege in mind.

Legal Workspace provides a base package with its cloud environment service and encourages clients to customize their environments to incorporate legal applications to formalize their processes and take extra steps toward protecting attorney-client privilege.

The cloud can be a safe place. Document sharing over the cloud can be secure. Law firms simply need to understand how breaches can occur and take precautions to protect all parties using the cloud.

If you have any questions about safe cloud sharing, feel free to reach out to our legal app experts here.

 

Everything You Need to Know About Cryptolocker & Ransomware

Cryptolocker Strikes

Buzzzzzzzz-That’s the sound of your alarm clock going off at 5AM, you have a big day ahead of you. You grab your phone, which moonlights as your alarm clock (among other things), and silence the alarm. With your phone in hand, you glance at your email — low and behold, there is the email from your client you’ve been waiting for! Quickly, your feet hit the floor, you move swiftly to your Keurig machine and brew up your morning cup while simultaneously powering on your laptop… Multitasking before 6am was not your plan, but you are very anxious to get logged in so you can open the attachment your client sent you.

Java in hand, shaking the sleep out of your eyes, you open your email, double click on that attachment you received, and you wait for it to open…. wait, why isn’t it opening? You double click it again and still nothing. Hmm, maybe the third time is the charm… double click and nothing. Frustrated, you decide to check the news and browse the web while you wait for your file to open. You open your browser and POW! What’s that noise? All of the sudden your computer is screaming at you and there is a message on your screen you have never seen before. Your computer is telling you it’s been infected with a virus meaning all of your files are locked and encrypted. To regain access to your files you need to call a strange international number and provide them with 5000 bitcoins (not dollars, yen, or pesos, but bitcoins– Bitcoins. What’s a bitcoin? Where do I get them?). Why is this happening to me? What on earth is going on?

What Is CryptoLocker and Ransomware?

You’ve just fallen victim to one of the most emerging cyber attacks on the planet. The email you thought was from your client was really a “spoofed” email address from a fraudster looking to make a quick buck off the innocent and unsuspecting professional. In technical terms, it’s called ransomware. The good news is, the story painted above did not actually happen to you, but it could.

Once considered a consumer problem, ransomware has morphed to target entire networks of computers at law firms and other businesses. These entities have more to lose than the average consumer making them prime targets for cyber crimes. According to the U.S. Department of Justice, ransomware attacks have QUADRUPLED this year compared to just one year ago, averaging about 4,000 a day. Typical ransomware payments range from $500 to $1,000, according to cyber-risk data firm Cyence Inc., but some hackers have demanded as much as $30,000. Every infection is unique and equally as painful to recover from.

How do you Prevent Cryptolocker and other Ransomware Attacks?

Now, you have to be wondering what you can do to prevent this happening to you and your entire practice….. The last thing you want to do is tell your largest client that all their matter files are corrupted, infected, and useless. The best thing you can do to prevent cyber attacks from happening to you is to invest in your technology, know what you’re up against, and train your employees. We recommend starting with the basics:

Anti-Virus Software- You have a myriad of choices when it comes to Anti-Virus software. Companies such as McAfee, Trend, and Symantec offer suitable small business products. These can help catch the majority of these infections before they begin.

Look before you click- When you receive an email with an attachment, look at the sender’s address to make sure it’s coming from their actual email address. Some spoofing attacks will use an email address that’s very similar to a legit one – chris@gmaiil.com instead of chris@gmail.com. It’s easy to overlook the extra letter in the domain name. If you question the email’s validity, check with the sender to ensure they sent it. If it came from someone you don’t know, or looks phishy (pun intended), delete the email immediately.

Augment your IT infrastructure to an IT Company- Spend your valuable time practicing law not figuring out IT. Companies, like Legal Workspace, spend the time, money, and effort to implement enterprise-level protection against online attacks. You’re in business to practice law, not understand and implement corporate IT solutions. Leave that to the experts.

I’m sure you’re glad this situation did not happen to you, and so are we. The cyber world is moving at a vigorous pace that can be hard to keep up with. Employ legal technology professionals to keep up with emerging threats and cover your bases for you. Practice law, not technology — leave your cybersecurity worries to us.