Peer to Peer Magazine

March 2010

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/7599

Contents of this Issue

Navigation

Page 44 of 87

www.iltanet.org 46 Peer to Peer Gotcha! Offense Is the Best Defense Against Security Vulnerabilities A ttorney John Doe receives an attachment via e-mail and opens it on his computer. the attachment is blank, so he closes it and continues to work. he visits websites, the firm intranet and goes about his business. John doesn't know it, but his computer, as well as the firm's intranet, have been compromised. The attachment had a keystroke monitoring software program embedded. Keystroke monitoring can be run remotely or by an attached device that resembles a USB drive. If you think this is unlikely, consider that this type of activity has already been used against celebrities and in corporate espionage attempts. This is just one type of security vulnerability that the legal industry must be vigilant against. Let's take a look at others as well as some necessary steps toward becoming more secure. Dark Clouds "Cloud computing" is the latest buzz phrase. We're now looking at more companies providing software as a service (SaaS), storage on demand and remote server capacity. As a result, some firm and corporate data may reside outside a firm's network and outside of the direct control of IT administrators. While you will vet vendors as much as possible, there will always be challenges; and frankly, there may not be a way to ensure 100 percent enforcement of your firm policies on a system that you do not have complete control over. For a look at some insightful questions that should be raised with vendors, visit this by Donna Payne

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - March 2010