Increasing Client Requirements: Securing Law Firms for the 21st Century

Securing Law Firms

Gone are the days of “basic security.” What used to be optional is now standard: two factor authentication, complex passwords, clean desk policies, data encryption at rest and in transit, mobile device management and up-to-the-minute patching. Clients expect these items to already be in place and are further expanding their expectations. They expect sophisticated and secure systems to keep their information safe. This obviously makes your IT professional’s job much harder. Additionally, attorneys expect instant performance and near 100% up time.

Achieving the delicate balance between accessibility and security is a challenge. Meanwhile, clients continue focusing attention on documentation, planning and training. The frequency of client-initiated audits has increased dramatically over the last five years. In 2013, Frandzel received its first audit; it was one page long and consisted of seven questions. In 2018, the firm received five audits. All were greater than one hundred pages in length. The longest one included over seven hundred questions. All of the inquiries seek documented information security policies, incident response plans and business continuity plans. Vulnerability scans of networks are required on a monthly basis, with classification and inventory controls put in place immediately. Clients seek annual security awareness and phishing defense training for all staff. The most consistent change is a requirement that the firm conduct substantial employee background checks for every new hire.

Information Security Policies

Developing one security policy for all clients is far simpler than answering every question individually. This practice also provides the firm and its third party vendors with guidelines to adhere to. These policies become a firm’s bible to follow with regards to information technology security. They include general information on security management standards, classification and controls, information users, guidelines for personnel and physical
security.

a. Information Security Policies – These identify (1) the firm’s Information Security Manager (“ISM”), the person responsible for your information technology, (2) how to manage sensitive information and (3) who can access what in your firm.

b. Classification and Control – This describes the fundamentals of information security, including a description of the information you maintain and how is it classified (i.e., private, sensitive, restricted or confidential).

c. Information Users – In most cases, the human factor is a firm’s greatest risk. Password standards, workstation security and automatic screen protection, end of day log off requirements, unusual behavior detection, mobile device protection, good judgment policy and most importantly, training all come into play.

d. Physical Security – Having physical controls in place helps staff follow standards with regards to securing visitors and physical rooms. Educating staff regarding visitor policies, such as keeping a log with the visitor’s name, date, purpose of visit and physically keeping all server rooms locked, also aid in security. These are standard requirements and commonly considered basic controls today.

Incident Response Plan

This documents your organization’s formal response plan in preparation for a breach.
Requirements in this area vary widely. Clients frequently dictate policy inclusions such as
maximum notification times, specific contacts, and general best practices. Regardless of whether
client requirements exist, general best practices include developing these procedures today. It is
common for these policies to include some or all of the following:

a. Names of your incident response team and key clients and the numbers you need
to call if an incident occurs;

b. The name of your key resources needed to maintain or resume operations;

c. Procedures for various incidents;

d. Inventory of all hardware;

e. Inventory of all software;

f. Inventory of connectivity vendors;

g. Inventory of critical IT documents;

h. Location of data;

i. Location of passwords; and

j. Inventory of vital business records.

Business Continuity Plans

A growing best practice is to combine both business continuity and incident response plans into a single document. They are of equal importance and tend to contain similar information. Whether it’s a breach, fire, earthquake, etc., you will need to follow documented plans of action equally. The primary focus is to ensure operability of technology resources without interruption to minimize loss of revenue. Properly documented and tested plans will enable your firm to remain standing.

Vulnerability Scans

Our firm has been executing vulnerability scans for several years. After executing the initial scan we realized how critically important these scans were. Numerous open ports, default passwords, and service accounts that historically didn’t matter provided opportunities for access, hacking, and even email relays. Once the openings were identified, we realized what was open, the process of making refinements was effective and permanent. Future scans identified minimal vulnerabilities and risks, which were created due to modifications and improvements in the environment. As our system continues to mature, security risks diminish and confidence both internally and with the firm’s clients improved.

Classification and Inventory Controls

What do you have, where is it located and how is it classified? Prior to inventorying documents, one must understand what is in one’s possession. Some of our firm’s clients are classifying documents when they send them to us with designations such as Restricted, Confidential, Internal and Public. Because of client turnover, mergers, etc., clients are inquiring more frequently as to what client data is contained within our system. Developing a reference of contents that identifies contents will ease in your ability to respond. Collaborating with information technology professionals, managing attorneys, and internal practice groups will help accelerate this process. Clients are increasing the frequency with which they are making these requests; getting in front of them early will help your firm prepare for the inevitable.

Security Awareness Training

Security Awareness Training seems the most basic of items, but is one of the most difficult to adhere to. End users frequently believe that “it won’t happen to me”, “I’m tech savvy”, or “I can spot a scam a mile away”. This risk involves human awareness and training, and it likely provides the most risk and vulnerability within your firm’s environment. Clients are well aware of publicized security breaches, and are beginning to mandate that law firms require annual security training for all staff. Best practices suggest utilizing an external party that is fully equipped, knows the industry, and is current with ongoing and increasing scams. Utilizing an expert will help maintain an interested audience for a longer period. Preventing breaches by investing in training will result in a tremendous return on investment.

Phishing Defense Training

Conducting a random click sampling via emails distributed to a firm’s end users has the potential to create the most eye opening of events. A test email is pushed out randomly after everyone has been through Security Awareness Training. The intent is not to trap or blame employees; quite the opposite, it is to be utilized as a training tool to help them naturally identify and avoid future scams. Clients have not yet begun to demand this type of training. Regardless, we are doing this in an effort to better educate and prepare our attorneys and staff.

Preparing for Ongoing Security Challenges

Client requirements for law firms around security policies, procedures, and preparation will remain steadfast. We anticipate them continuing to escalate over time. By staying on top of ongoing audit requests, performing scans, and training employees, our firm is in a strong position. We utilize our experience and investment as a marketing tool to garner new business. While some attempt has been to minimize client requirements, embracing change and protecting your firm’s information security investment is not only wise, it may even impress your clients and garner the firm more business.

Announcing Our New Website

Frandzel's new website

As we launch our new website we have reflected on the fact that for more than three decades Frandzel has been a recognized leader, providing legal counsel and litigation services to financial institutions and businesses. Our firm is built on highly responsive service incorporating trusted knowledge cultivated over the years. We are about helping our clients achieve their business objectives always striving for creative solutions to the toughest challenges.

We have great pride in our warm culture and mentoring environment. It has, in fact fostered many careers with longevity for our attorneys and staff. Our client relationships have stood the test of time and work with us as a valued business resource.

We look forward to continuing to serve the banking and finance communities incorporating with our time-tested culture and accumulated wisdom.

The History of Fun, Gaming and Frandzel

Games at Frandzel

In 1979, Bob Frandzel founded what is today known as Frandzel Robins Bloom & Csato, L.C. Bob, with his unbound energy and enthusiasm, envisioned a state of the art go-to creditors’ rights and commercial law firm, and set out to create it with lawyers that shared his vision – but didn’t take themselves too seriously (as exemplified by the games, such as “Creditors’ Pursuit”, “Daze of our Loans” and “The Creditors’ Deal” that we created for our clients and friends over the years).

The games we created some years ago are a wonderful reminder of our caring culture and ability to laugh and have fun. But our philosophy was and is simple: every client is important, and we will do what it takes to get the job done. Whether closing a deal, litigating a dispute, or providing counsel, the success of our clients is our measuring stick.

  • Frandzel's The Creditor's Deal card game
  • Frandzel's The Creditor's Deal card game
  • Frandzel's The Creditor's Deal card game
  • Frandzel's Daze of Our Loans board game
  • Frandzel's Daze of Our Loans board game
  • Frandzel's Y2K Bug survival guide
  • Frandzel's Y2K Bug survival guid
  • Frandzel's Y2K Bug survival guid
  • Frandzel's Y2K Bug survival guid
  • Frandzel's Creditor's Pursuit game
  • Frandzel puzzle
  • Frandzel puzzle
  • Frandzel puzzle