We use cookies to improve your experience and optimize user-friendliness. Read our cookie policy for more information on the cookies we use and how to delete or block them. To continue browsing our site, please click accept.

How Secure is Your Firm’s Cyber Security Health?

How Secure is Your Firm's Cyber Security Health?

Receive-EmailAbout our Forensic and Valuation Services

Cyber breaches and attacks are happening daily. In 2015, 1,346 records were lost or stolen every minute. Law firms are continuing to be targeted because it can have a similar payoff to breaching hundreds or thousands of companies or individuals. Law firms uniformly have vulnerabilities in their systems, allowing malicious attackers to gain access to a dangerous set of data. When was the last time your firm had a conversation about your cyber health?

The Panama Papers cyber-attack has prompted law firms to get a second opinion as to their internal defense strategy. We meet many confident IT professionals that suggest their organizations are impenetrable and possess layers of defense. But how strong are their defenses really?

There are a few basic steps your firm can be taking to help mitigate risk. Create an Information Security Committee that goes beyond just your IT department. Include key personnel and staff from upper management and relevant departments so all aspects of the firms security are discussed. Write an Information Security Program that includes documented policies and procedures, as well as risk analysis and contingency plans. Train your staff on cybersecurity awareness and emphasize the importance of using strong and unique passwords. And finally, allocate the proper funds for cybersecurity and have a penetration test done annually by an independent security firm to ensure you’re in a position of strength.

WithumSmith+Brown’s Cyber Secure Services team is providing solutions for the entire cybersecurity ecosystem – from identifying key assets and protecting them, providing discovery services, responding with forensics investigation and recovery (i.e. litigation support, valuing damages, calculating valuation allowance for intangible asset impairment, supporting cyber insurance claim process) services from an attack.

“For it is no longer a question of ‘if,’ but ‘when’ and ‘how often.’ I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” Robert S. Mueller, Former FBI Director

If you’re concerned about maintaining the security of your clients and firm, give your cyber security more than a second thought. If you’re interested in learning more about Withum’s services and how we have helped firms like you, let’s start a discussion.

Joseph R. Riccie - CPA, Partner Joseph R. Riccie, CPA, Partner
T (609) 520 1188
jriccie@www.withum.com
View Experience

linkedin

Ask Our Experts

To ensure compliance with U.S. Treasury rules, unless expressly stated otherwise, any U.S. tax advice contained in this communication is not intended or written to be used, and cannot be used, by the recipient for the purpose of avoiding penalties that may be imposed under the Internal Revenue Code.

Previous Post
Next Post

Get news updates and event information from Withum

Subscribe