- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Calendar
- Careers
- Client Training Videos
- Contact
- Contact Thank You
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Litigation Services
- Login
- Office in a Box
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
Penetration Testing for Law Firms
For many law firm clients, penetration testing is not only a friendly suggestion but also a requirement. Penetration tests help ensure adherence to compliance obligations mandated by regulations, including ABA and HIPAA accordingly. Moreover, if clients do not currently require penetration testing, it is good practice to regularly perform them to ensure systems are secure and current and future clients have assurance that sensitive data is protected.
What Is Penetration Testing?
How Can a Firm Get the Most Out of Penetration Tests?
While it’s possible for firms to perform tests on their own, penetration tests often produce the best results when they are conducted by a third-party partner. Partners have access to a variety of tools to perform the test and can determine which type of test is best based on the firm’s circumstances. Furthermore, a partner will delve deeper into the networks, systems, and applications than a less experienced security professional.
Effective third-party penetration testing partners will guide you through the testing process and provide and explain the reports and necessary next steps to improve security.
2. Scope the Test Properly
Thorough penetration tests will ensure the greatest number of vulnerabilities are found. Comprehensive tests are dependent upon proper scoping. Therefore, to ensure the test is properly scoped, consider all the devices and network elements in your firm’s system. This includes active hosts, Wi-Fi-enabled hardware and applications.
Comprehensive penetration tests will also involve an external and internal scan. External penetration testing targets the network perimeter and identifies defects on the Internet-facing systems. Internal penetration tests target the internal networks used by firm team members.
3. Prioritize Risks
Once a report from the penetration test is generated, it should be used to determine the priority risks that need to be handled immediately and lower risk factors that can be addressed later.
4. Supplement Penetration Testing with Vulnerability Testing
The cousin of penetration testing is vulnerability testing, which involves scanning all networked devices for potential vulnerabilities. Vulnerability testing can be done automatically, more quickly, and at a lower cost. This type of test reports which vulnerabilities exist and if anything has changed since the last test. Vulnerability testing should also be completed on a regular basis, as often as once a week. The biggest difference is that penetration testing provides a more in-depth and detailed picture of potential risks. Both tests are vital, but penetration testing offers a proactive approach to cyberattack prevention, whereas vulnerability testing is a reactive mechanism.
5. Use the Test’s Findings to Develop or Improve Incident Response Plans
After remedying the vulnerabilities discovered in the penetration test, use those findings to further protect systems and data by reviewing them against your firm’s incident response plan.
Create response policies on how your firm should manage disruption if a bad actor exploits the vulnerabilities found in the testing. Once a threat is identified, the incident response plan should have recommendations on how to contain it. The plan should include instructions on how to eliminate threats and actions the firm must take to recover, including steps on restoring systems and communicating incidents to the appropriate stakeholders.
Gulam Zade is the chief legal officer of Frontline Managed Services.
Read the full article here.
Reprinted with permission from the Wednesday, May 25th issue of the Legal Intelligencer on Law.com. © 2022 ALM Media Properties, LLC. Further duplication without permission is prohibited. All rights reserved.