Skip to content
Information Age

Information Age

Insight and Analysis for the CTO

  • Subscribe
  • Login
  • facebook
  • x
  • linkedin
  • RSS
  • News
    • IPOs
    • M&A
    • Major Contracts
    • People Moves
    • Releases & Updates
    • Events
  • Data & Insight
    • Case Studies
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • Business Skills
    • Webinars
  • Sectors
    • Agriculture
    • Automotive
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy & Utilities
    • Financial Services
    • Government & Public Sector
    • Healthcare & Life Sciences
    • Legal & Accountancy
    • Manufacturing
    • Property
    • Retail
    • Technology
      • Payments technology
    • Telecoms
    • Transport & Logistics
  • Topics
    • AI & Machine Learning
      • Generative AI
    • Automation & Robotics
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
      • DevOps
    • Digital Transformation
      • Disruptive Innovation
    • Emerging Technology
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech Giants
  • Careers
    • Business Skills
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • News
    • IPOs
    • M&A
    • Major Contracts
    • People Moves
    • Releases & Updates
    • Events
  • Data & Insight
    • Case Studies
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • Business Skills
    • Webinars
  • Sectors
    • Agriculture
    • Automotive
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy & Utilities
    • Financial Services
    • Government & Public Sector
    • Healthcare & Life Sciences
    • Legal & Accountancy
    • Manufacturing
    • Property
    • Retail
    • Technology
      • Payments technology
    • Telecoms
    • Transport & Logistics
  • Topics
    • AI & Machine Learning
      • Generative AI
    • Automation & Robotics
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
      • DevOps
    • Digital Transformation
      • Disruptive Innovation
    • Emerging Technology
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech Giants
  • Careers
    • Business Skills
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • Subscribe
  • Login
Home » Topics » Cybersecurity » How a desk liberation has led to a security nightmare in the legal sector

How a desk liberation has led to a security nightmare in the legal sector

Avatar photoby Ben Rossi8 February 2016

During the Autumn Statement back in November Chancellor George Osborne placed significant importance upon the investment in the use of technology within the justice system, including the digitalisation of courtrooms and the moving of paper-based systems online.

Whilst the plans for digitalising the justice system has been in the pipeline  for several years, we are now beginning to see these come into force and are witnessing the knock on effect for law firms.

In recent years, the digital landscape has had a revolutionary impact not only in terms of the way employees can now work, but also where they can work. Lawyers have been increasingly liberated from their desks and are accessing documents not only from their office desktop, but also their laptops, phones and tablets. The office is now, in essence, wherever they are.

> See also: 75% of companies now have flexible working policies – and say they boost their policies

A report released earlier this year, which looked at technology trends in the legal industry, has backed up this trend and highlighted how legal firms are increasingly using web-based software in their law practices, with 72% saying that online document storage was now available in their law offices.

The main driving factors were convenience and affordability, with 78% citing easy access to data from anywhere as one of the greatest benefits of using web-based software in their law firms and 67% adding that a key benefit was 24/7 availability to access their documents remotely.

The movement of legal processes onto the web has been a real step-change for a traditionally paper-based industry. The move online, however, has led to the increased importance of data security.

Security software and assessments was ranked as one of the top ten technology purchases this year and fifth among planned purchases for next in a recent survey undertaken by the International Legal Technology Association (ILTA).

Indeed, security management was named as the biggest challenge facing legal IT departments, replacing email management for the first time in eight years. Related to this was the need for information governance and risk management/compliance.

Whilst this is of concern to all, improving data security has thus far been considered more of a priority among large law firms than medium-sized or small law firms, however the research suggests that times are changing.

One of the key trends affecting modern day law firms is that of bring your own device (BYOD). However, over a quarter (28%) of respondents said their firms do not currently have a policy, viewed by many as a key security measure.

> See also: The year that flexible working is fully embraced

The dramatic cultural shift in digitalisation has shaken the core of the legal sector and has directly transformed the culture within each individual law firm, through the increased viewing and sharing of documents online.

However, whilst this may mean a new found freedom for lawyers who find themselves no longer captive within their offices, it has led to a need for the industry to implement strong multiple authentication factors and user provisioning, which will allow them to keep the benefits but eliminate the risk.

It is imperative that each and every individual law firm, regardless of size, ensure priority is placed on protecting sensitive data that is being accessed remotely on a daily basis.

Not only will this help them remain compliant with changing regulations, by preventing unauthorised users from accessing sensitive data with passwords alone, but it will help to avoid any potential damage to brand reputation caused by sensitive data being accidentally shared with the wrong people or a misunderstanding of processes.

Sourced from David Meyer, VP for product, OneLogin

Avatar photo

Ben Rossi

Ben was Vitesse Media's editorial director, leading content creation and editorial strategy across all Vitesse products, including its market-leading B2B and consumer magazines, websites, research and... More by Ben Rossi

Related Topics

Related Stories

Cybersecurity

Building blocks – what’s required for my business to be SECURE?

Here is how to build up your cybersecurity defences, broken down step-by-step, to keep your business safe and secure

Cybersecurity

Bridging the IT and security team divide for effective incident response

Greater alignment between IT and security teams is crucial for effective incident response – here's how to lay down the foundations

Cyber Innovation

Why shutting down systems can backfire during a cyber attack

Cybersecurity

Why banning ransomware payments is only a limited fix

JumpCloud's Chief ISO explains how ransomware attacks are still a threat despite proposed legislation and discusses some key defence strategies

Helping you grow your business is our number one priority, if you would like to take your business to the next step just sign up!

sign up now

Related Stories

Cybersecurity

Building blocks – what’s required for my business to be SECURE?

Here is how to build up your cybersecurity defences, broken down step-by-step, to keep your business safe and secure

Cybersecurity

Bridging the IT and security team divide for effective incident response

Greater alignment between IT and security teams is crucial for effective incident response – here's how to lay down the foundations

Cyber Innovation

Why shutting down systems can backfire during a cyber attack

Cybersecurity

The risks of supply chain cyberattacks on your organisation

Nick Martindale explores the risks to organisations associated with supply chain cyberattacks and what you should do about it

We provide general intelligence for technologists in the information age. We support CTOs, CIOs and other technology leaders in managing business critical issues both for today and in the future.

Further Information

  • Privacy Policy
  • Terms & Conditions
  • Contact Us
  • About
  • Media Packs
  • Contributor Guidelines

Contact us

  • +44(0) 207 846 1378

Address

  • Stubben Edge
  • 77 Cornhill
  • London
  • EC3V 3QQ