Download presentation
Presentation is loading. Please wait.
1
The Secure Contingency Plan
Cyber Security The Secure Contingency Plan
2
Cyber-Threats – Increase in Cyber Crimes globally, for example: The WannaCry Ransomeware Attack Worldwide cyberattack Ransomware Cryptoworm Targeted computers running the Microsoft Windows operating system The Panama Papers 11.5 million documents More than 214,488 offshore entities Between 2016 and 2017, we saw an increase in cyber crimes globally. To date, two instances of threats to data became the talk of numerous international bodies: The WannaCry Ransomeware Attack - The WannaCry attack was a worldwide cyberattack by the WannaCry ransomware cryptoworm, which targets computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. The Panama Papers – Major data leak of confidential 11.5 million documents that detailed financial and attorney–client information for more than 214,488 offshore entities.
3
Primary Targets Data Rich enterprises such as: Law Firms
Sensitive information that will garner them big payouts Healthcare Institutions Health information - a mixture of personal and financial information Primary Targets for Ransomware and Data attacks are: Law Firms - Data-rich law firms are an attractive target for cybercriminals in search of sensitive information that will garner them big payouts. Healthcare Institutions - There are a few obvious reasons that make the medical sector an enticing target for cyber attacks. Health information is a mixture of personal and financial information.
4
Foundational Questions
Important Questions: What data / assets need protection? What are the most realistic internal and external threats to the data / assets? How vulnerable are we to these threats? In order to assess a law firm’s data security profile, three pertinent questions must be addressed:
5
Key Stakeholders Collaboration from all stakeholders required:
More than just a decision for your IT team Lawyers, managers, professional staff and IT team Partner with experts in the field Requires engaged collaboration from all stakeholders. More than just a decision for your I.T team. Lawyers, managers, professional staff and I.T need to collaborate to mitigate. Partner with experts who truly understand the types of data the firm has and then implement a process to identify the most likely threats to each of the data types.
6
Identify Vulnerabilities
Work with experts to: Identify existing business processes that can create a potential risk Conduct Technical Vulnerability Testing Take an in-depth look at non-technical elements Work with experts to identify existing processes that can create a potential risk. Technical Vulnerability testing. Taking an in-depth look at non-technical elements that can make a firm an easy target to threats.
7
The Outcome The organization should be able to:
Build a solid foundation Identify an outside resource Identify if they are in a place to respond to a hypothetical loss or disclosure of confidential client data. Once all the above questions have been addressed and answered, an organization should be able to: Identify a solid foundation to begin the process of designing and implementing an enhanced network security plan. Identify an outside resource to assist in implementing an managing their data security. Identify if they are in a place to respond to a hypothetical loss or disclosure of confidential client data.
8
Summary Lumisol Technology has partnered with Check Point to provide a full scale network solution including but not limited to: Next Generation Threat Protection Mobile Security Endpoint Security Next Generation Firewalls Data Security & Security Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.