- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Litigation Services
- Login
- MITS
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Litigation Services
- Login
- MITS
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Jim Turner, EVP of Business Development, Quoted in LegalTech News Discussing Third-Party Data Vulnerabilities
January 26, 2021
In light of the December 2020 reporting that SolarWinds’s Orion platform was hacked, Jim Turner was quoted in the January 21, 2021 LegalTech News discussing third-party data vulnerabilities on law firms that are cyber-attacked and have no protection. While the platform isn’t commonly used among law firms, firms’ data could be at risk due to the other companies and government agencies that were hacked.
“The firms we work with don’t use it,” Turner said. “The risk is coming in from their vendors and supply chain.”
To mitigate this risk in light of the Orion hack and similar future attacks, firms should have a plan for third-party vulnerabilities. “It’s always a good practice for firms to have a process whenever there’s a hack,” Turner told LegalTech News. “Firms should have an incident response plan. Many firms don’t, but they should.”
These response plans should be designed to assess and triage potential vulnerabilities. “We may not know the true severity for years to come, that’s how big it is,” he said of the Orion hack. “That’s why IT needs to scan the networks, audit and follow security best practices.”
From a preventative standpoint, Turner suggests firms are too often lulled into a false sense of protection when their IT departments or vendors provide services. “In some firms, they become complacent that their internal IT department or vendors are on top of things, and what we’ve seen in high-profile hack so flaw firms’ internal IT or outsource IT providers is that they weren’t up-to-date.”
For the full article, LegalTech News subscribers may access the article here.