Law firms increasingly rely on computer and data management systems to create, share and store information. Research, document review and communication between clients, other attorneys and courts have sped up because of digital technology. In fact, many law firms have gone entirely paperless.
- Backup & Recovery: As estimated 40% of businesses don’t start backing up their data until they have a hard drive failure, yet data is always at risk from natural disasters, malware, loss and theft. Most law firms are ahead of this curve and mitigate data loss by implementing some form of backup and recovery system, whether it be other external hard drives, cloud backup or storage at an offsite location. Yet surprisingly, according to a 2015 ABA Legal Technology Report, only 26% are taking advantage of arguably the most cost-effective and painless way to back up their data: cloud backup.
- Security: Twenty-three percent of large law firms reported experiencing a security breach, according to the 2015 ABA Technology Report. That same study revealed only 20% use full drive encryption and about 35% use email encryption. Data encryption protects stored and transmitted data and should be a basic safeguard for every law firm; email encryption makes email content inaccessible unless you have a passkey, ensuring the email remains confidential and privileged between the sender and receiver.
- Legal & Office Software Management: Between legal and documentation management software (e.g., AbacusLaw, Trial Works and Amicus Attorney) office productivity suites (e.g., Office 365, Google Docs, DropBox), research tools (WestLaw, Lexis, Loislaw) and presentation software (e.g., Sanction), there are a lot of moving pieces. Many offices struggle with hardware lifecycle, warranty management and support issues, not to mention integration, backup and upgrades.
Cayfour’s approach includes electronic auditing and evaluation of your systems using the latest technologies for that purpose, including:
- Finding any “leaks” in your system, data that is being inappropriately being sent to third parties
- Identifying the loss of data in small or large tranches
- Locating the existence of malware of any type, including viruses, Trojans, applications or executables intended to damage or corrupt your data
- Managing your hardware lifecycles and warranties
- Identifying any person or entity who has access to your network who isn’t authorized
- Designing your infrastructure in a scalable manner that lends itself to future ease of expansion of computing and storage systems
- Delivering a ‘report card’ from these actions detailing where you stand right now
2015 statistics showed that it took 204 days on average to detect a compromise. Inside Counsel
Based upon that report card there are a variety of steps we take to get you stable and secure, and ensure you stay that way. We may recommend that you , behind a firewall, to confirm that only authorized personnel have access to your data. Or, we may recommend that you continue to store your data “on premise” (on prem) with appropriate protection and monitoring measures in place to ensure that you, or we, will know at any given time the security and status of your network.
These steps tie neatly into our other offerings, and you may decide to use us as your Information Technology support team to support your hardware, prepare you for growth and/or store your data. Please contact us to start the conversation.