Peer to Peer Magazine

Fall 2014: Security Is Everyone's Business

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/411912

Contents of this Issue

Navigation

Page 20 of 91

22 PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA INCORPORATE TECHNOLOGY, STRATEGY AND ALLIANCES name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Terry Aurit company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Savvy Training & Consulting website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . www.savvytraining.com Think TSA! It's not always the most pleasant experience, but the TSA has managed to keep millions of people and assets safe from external threats. You need a similar program, without involving any latex gloves or full-body scans. • T – Technology: Obviously, utilizing technology to evade threats is vital. Are you deflecting malware before it has a chance to infect the organization? • S – Strategies: Will you be able to anticipate and possibly recover from breaches? Do you have a plan in place? • A – Alliance: People are your weakest link! You must form an alliance with each and every person who has access to your premises or your work product. Do you have policies regarding locking down firm laptops? Can the cleaning crew access the contacts in a desktop Rolodex? Are you viewing a sensitive document while in an airport or other public area? The technology and strategic plans are vital, but you must continually communicate with the people in your organization to remind them of risks. Imprint the image of an airport security line to remind them why it takes a strategic alliance, coupled with technology, to reduce the chance of a disaster. ASK THE VENDOR DEVELOP AN INCIDENT RESPONSE PLAN name . . . . . . . . . . . . . . . . . . . . . . . Doug Brush company . . . . . . . . . . . . Kraft & Kennedy, Inc. website . . . . . . . . . . . www.kraftkennedy.com It's not a matter of if, it's a matter of when you will experience an incident that impacts the confidentiality, integrity or availability of your data. While preventive and detective controls are important in mitigating threats, it is just as important to have an organized response plan to accurately determine if an event is actually an incident so you can take the necessary steps to control the situation and get the impacted resources in production again. The more disorganized your response efforts are, the more time, money and resources are lost getting the situation under control while also increasing the risk that the issue is spread to other systems. Make sure your incident response plan has the right resources such as call trees, secure communication channels and trained staff in place well before an incident so the mean time to respond (MTTR) can be reduced to levels that allow your team to respond fluidly to the situation. Also, it's important that your team document all actions during a response so the process can be reported to management and serve as an educational tool to improve future response efforts. And remember: Stay calm! What's the one tip you'd offer on how to improve security in an organization? Want to appear in the next Peer to Peer? Here's the question for the Winter edition on all things mobile, virtual and cloud-based: What one technology is revolutionizing connectivity? (think lawyers connecting to clients, users connecting to info, staff connecting across global offices, etc.) Send your answer to kristy@iltanet.org MAKE USERS AWARE name . . . . . . . . . . . . . . . . . .Joseph Marquette company . . . . . . . Accellis Technology Group website . . . . . . . . . . . . . . . . www.accellis.com The number one tip is awareness. Firm members have to know what risks exist, what actions to avoid and what to do if they think something is wrong. All the technology in the world can't help you if a secretary connects a virus-laden thumb drive to her desktop!"

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - Fall 2014: Security Is Everyone's Business