{"id":1123,"date":"2021-03-03T09:36:13","date_gmt":"2021-03-03T13:36:13","guid":{"rendered":"https:\/\/www.baronedefensefirm.com\/blog\/?p=1123"},"modified":"2022-10-18T13:06:19","modified_gmt":"2022-10-18T17:06:19","slug":"five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data","status":"publish","type":"post","link":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/","title":{"rendered":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data"},"content":{"rendered":"<p>Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But hackers are no longer just focusing on the big giants.\u00a0 Today\u2019s headlines include prominent law firms who are falling victim to cyber-attacks.\u00a0 Recently, we saw Jones Day law firm on the defense of a cyber-attack.\u00a0 Jones Day, who has many prominent clients including former President Donald Trump, had files stolen and posted on the dark web.\u00a0 But Jones Day is not alone, many law firms lack strong cybersecurity programs, thus making them prime targets to cyber-attacks.<\/p>\n<p>Today, bad actors continue to scope out new targets.\u00a0 Law firms are an attractive target because of the sensitive data that they retain.\u00a0 Many law firms have access to highly confidential corporate data in addition to sensitive individual personal data.\u00a0\u00a0 Law firms house highly sensitive information like financial data, corporate strategies, trade secrets, business transaction information, and other private information.\u00a0 In all these cases, law firms have both a legal and ethical obligation to protect their client\u2019s data.\u00a0 As lawmakers attempt to enact legislation to protect consumer\u2019s data, this ever changing legislative landscape is often difficult to maintain and implement.<\/p>\n<p>Relying on in-house counsel or your IT department is not enough.\u00a0 To ensure your law firm is ready for a data breach, it is critical to have a cybersecurity attorney on retainer.\u00a0 \u00a0IT security professionals are stretched thin.\u00a0 Many outsourced IT resources have multiple clients that they service.\u00a0 In an environment where we find a shortage of security expertise, recruitment and retainment of IT security staff is a challenge.\u00a0 They are often difficult to find and if you are lucky to have a dedicated IT security professional, rarely do they understand the law.\u00a0 State, local and sometimes international laws have specific legal requirements for the protection of private and privileged information, an IT team cannot manage on their own.<\/p>\n<div class=\"read_more_link\"><a href=\"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/\"  title=\"Continue Reading Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data\" class=\"more-link\">Continue Reading \u203a<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But hackers are no longer just focusing on the big giants.\u00a0 Today\u2019s headlines include prominent law firms who are falling victim to cyber-attacks.\u00a0 Recently, we saw Jones Day law firm on the defense [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44,38,4],"tags":[],"class_list":["post-1123","post","type-post","status-publish","format-standard","hentry","category-cyber-security-law","category-ethics","category-marijuana-laws"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data &#8212; Michigan Criminal Defense Lawyer Blog &#8212; March 3, 2021<\/title>\n<meta name=\"description\" content=\"Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But &#8212; March 3, 2021\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data &#8212; Michigan Criminal Defense Lawyer Blog &#8212; March 3, 2021\" \/>\n<meta name=\"twitter:description\" content=\"Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But &#8212; March 3, 2021\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barone Defense Firm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data &#8212; Michigan Criminal Defense Lawyer Blog &#8212; March 3, 2021","description":"Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But &#8212; March 3, 2021","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/","twitter_card":"summary_large_image","twitter_title":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data &#8212; Michigan Criminal Defense Lawyer Blog &#8212; March 3, 2021","twitter_description":"Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But &#8212; March 3, 2021","twitter_misc":{"Written by":"Barone Defense Firm","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/#article","isPartOf":{"@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/"},"author":{"name":"Barone Defense Firm","@id":"https:\/\/www.baronedefensefirm.com\/blog\/#\/schema\/person\/94b0d325214ff8d5df7b437cbd627fab"},"headline":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data","datePublished":"2021-03-03T13:36:13+00:00","dateModified":"2022-10-18T17:06:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/"},"wordCount":953,"articleSection":["Cyber Security Law","Ethics","Marijuana Laws"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/","url":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/","name":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data &#8212; Michigan Criminal Defense Lawyer Blog &#8212; March 3, 2021","isPartOf":{"@id":"https:\/\/www.baronedefensefirm.com\/blog\/#website"},"datePublished":"2021-03-03T13:36:13+00:00","dateModified":"2022-10-18T17:06:19+00:00","author":{"@id":"https:\/\/www.baronedefensefirm.com\/blog\/#\/schema\/person\/94b0d325214ff8d5df7b437cbd627fab"},"description":"Cyber-attacks in general are on the rise.\u00a0 In 2020 we witnessed security breaches at Solarwinds, Twitter, and Marriott and many other businesses. But &#8212; March 3, 2021","breadcrumb":{"@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronedefensefirm.com\/blog\/five-low-cost-steps-law-firms-can-use-to-protect-sensitive-client-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronedefensefirm.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Low Cost Steps Law Firms Can Use to Protect Sensitive Client Data"}]},{"@type":"WebSite","@id":"https:\/\/www.baronedefensefirm.com\/blog\/#website","url":"https:\/\/www.baronedefensefirm.com\/blog\/","name":"Michigan Criminal Defense Lawyer Blog","description":"Published by Michigan Criminal Defense Attorney \u2014 Barone Defense Firm","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronedefensefirm.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.baronedefensefirm.com\/blog\/#\/schema\/person\/94b0d325214ff8d5df7b437cbd627fab","name":"Barone Defense Firm","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1f0e878776f55f989955a958fafcf0267fceef4d497437d7b508468627f823ad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f0e878776f55f989955a958fafcf0267fceef4d497437d7b508468627f823ad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f0e878776f55f989955a958fafcf0267fceef4d497437d7b508468627f823ad?s=96&d=mm&r=g","caption":"Barone Defense Firm"}}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/posts\/1123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/comments?post=1123"}],"version-history":[{"count":1,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/posts\/1123\/revisions"}],"predecessor-version":[{"id":1124,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/posts\/1123\/revisions\/1124"}],"wp:attachment":[{"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/media?parent=1123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/categories?post=1123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronedefensefirm.com\/blog\/wp-json\/wp\/v2\/tags?post=1123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}