This website uses cookies

This website uses cookies to ensure you get the best experience. By using our website, you agree to our Privacy Policy

Jean-Yves Gilg

Editor, Solicitors Journal

Data security: Are you doing enough?

Feature
Share:
Data security: Are you doing enough?

By

By Managed Services Centre (MSC)

By Managed Services Centre (MSC)

In 2011, over 263m malicious computer programs were detected. Malicious files were found in 4.5 per cent of all emails. Annually, the loss or theft of customer data costs UK businesses £1bn. The sophistication of cybercrime is growing.

The consequences of security breaches are becoming more serious. They cause enormous business disruption, financial losses, potentially severe third-party liabilities and damage corporate reputation and client retention. Such detrimental effects can be significantly minimised through proactive security policies.

There are three readily accessible security options that even established IT departments are often found not to employ. Real time security, key-logging protection and continuous secure data back-up are all practical, cost-effective and easily implementable barriers to modern cybercrime. They should be part of any overall business '¨IT and data management strategy.

There are several common factors among law firms:

 

  • IT is a constantly evolving area – even the most proficient legal IT departments may not always employ leading-edge technology;'¨

  • in many cases, IT security services are not regularly reviewed to ensure maximum protection against the latest threats;'¨

  • data back-up methods are often outdated and do '¨not offer full protection; and'¨

  • for smaller practices without an IT department, there is often a reliance on a sole individual, leaving a business inherently vulnerable.

1. Real-time security

Real-time security continuously monitors the entire network, enabling potential vulnerabilities to be detected and rectified immediately. It is no longer adequate for IT security teams to carry out sporadic security checks.

MSC’s real-time security range, mscprotect, includes a range of continual monitoring services for securing each part of an organisation’s IT systems, network and online presence. All our services activate an alert as soon as a threat is discovered, enabling our technical team to resolve the issue immediately.

2. Key-logging protection

Data-stealing malware is one of the biggest threats to a company. The goal of cybercriminals is to steal confidential data that can be turned into a profit.

The most common ways of inserting this malware '¨onto a victim’s computer include: malicious programs hidden within enticing emails; exploiting open entry points critical to a company’s productivity; hiding within online advertisements; redirecting users from legitimate websites '¨to fake, infected websites; and sneaking the malware into '¨a corporate network.

Data-stealing malware can reside on a computer without being recognised by commercial antivirus software; it can operate undetected for long periods of time.

It is increasingly difficult to prevent the intrusion of data stealing malware. The most effective security measure is to disable its function by deploying key-logging protection. This software prevents users’ keystrokes, screen captures and mouse clicks from being recognised by data-stealing malware. A straightforward security solution is offered by MSC which ensures ultimate data protection of both corporate and personal data.

3. Continuous secure data back-up

Many firms still rely on traditional back-up methods such as tapes or hard disks: this lacks up-to-date security measures, reliability and takes up valuable time.

MSC’s remote, automatic data back-up, mscvault, is reliable, safe and time efficient. It encrypts data which is backed-up throughout the day. It causes no disruption to employees and provides rapid secure recovery in the event '¨of data loss.

Conclusion

Real-time security services, key-logging protection and remote back-up are an essential part of a suite of managed security measures that are vital to the protection of legal IT systems and data; their absence should require a law firm to review its IT security and seek expert advice immediately.

 

rebecca@msc247.com, TEL: 0333 55 55 247

Managed Services Centre (MSC) is one of the UK’s leading providers of proactively-managed IT services and security to banks, building societies, government embassies and SMEs. www.msc247.com