There are main offices and home offices, but attorneys are typically always on the move, gathering information on cases or visiting clients, partners, or consultants. Using the internet for cloud access means you have to trust the provider to protect and store sensitive data on its servers – this kind of data breach will only happen if you work remotely in a location such as an airport, hotel, cafe or public space. Hackers are already entrenched in many public spaces, waiting to steal victims’ data, hijack files with crypto-ransomware, or delete documents entirely. A 2022 Cost of a Data Breach study from Ponemon Institute LLC found that 45% of breaches were cloud-based and the average total cost of a data breach was $4.35 million — a risk that naturally makes it too expensive to afford.

Companies must have appropriate security protocols in place to use security technology to protect their data when accessing or sharing information. According to the American Bar Association’s 2022 Cybersecurity Survey, 89% of respondents said they have one or more policies on the use of secure technology. However, this number can be deceiving as the report found that only 67% have an email usage policy, followed by 63% who have an acceptable computer usage policy and 60% who have an internet usage policy. 59% have a remote access policy in place.

Information can be compromised and hacked through all of the above methods. Therefore, it is important for organizations not only to ensure that every policy is compliant and not fooled by misleading “security” language, but also to develop and build stronger, more comprehensive security standards to be applied across the organization. important. Security starts with people and the execution of policies. Therefore, data security hygiene is extremely important for law firms and all their partners, subcontractors, experts and others.

The solution is a cloud in your pocket that you can control, carry without fear of loss or theft, and can be securely accessed to retrieve the files you need.

Myth: Password-protected cloud services provide adequate protection against cyberattacks
A professional man using a laptop and showing thumbs up; overlay image of electronic circuits and graphics for uploading and downloading data to the cloud.3

Kingston IronKey’s Vault Privacy 50 Series USB Flash Drives, Keypad 200 Series Hardware Encrypted USB Flash Drives, and D500S USB Flash Drives are air-gapped to retrieve files without access to the Internet, even if they are located remotely. In addition to enhanced password protection, each drive features a secure microprocessor built directly into the device to provide durable hardware protection that cannot be bypassed or manipulated by cyber or digital attacks. Software-encrypted drives or systems are highly vulnerable to cloud-based cyberattacks that remove the software barriers to digitally cracking passwords or reformatting drives.

These hardware protections make Kingston IronKey a recognized and trusted storage drive for sensitive data. Validated with independent penetration testing for enterprise-grade security, the VP50 Series eliminates network vulnerabilities and features FIPS 197 certified AES (Advanced Encryption Standard) 256-bit hardware encryption in XTS mode – an international standard that provides the highest level of data security, guaranteed and recognized In the United States by the government. The KP200 Series and D500S feature FIPS 140-3 Level 3 certification (pending), the latest military-grade security defined for government agencies and the military, and the strongest security for highly sensitive and classified data. Both also feature a NIST-approved epoxy structural layer to prevent attacks on their semiconductor components, further raising the bar for data protection.

When attorneys travel to international locations with different policies and rules, it can be helpful to store confidential information on a password-protected, hardware-encrypted drive rather than in the cloud or directly on your computer and email inbox. Some countries allow unlocking personal computers or phone devices for inspection or even confiscation, exposing their contents to the risk of espionage or theft. Using Kingston IronKey drives reduces this risk and provides the best possible protection for all possible scenarios faced by traveling attorneys.

To facilitate sharing between parties or if a password is initially forgotten due to human error, VP50 and D500S Series drives offer multiple password options: user, administrator, and one-time recovery (available for VP50 Series and D500S); traditional complex password , providing 3 of 4 character sets and at least 7-8 characters, depending on the drive; the new password mode provides 10-64 or even up to 128 characters of free text. The FBI and NIST recommend using passwords instead of complex passwords. The longer the password, over 15 characters, the more secure it will be against attempts at guessing.

The KP200 series is an operating system independent driver that can be used on almost all operating systems and even machines, such as: B. Security printers or copiers for printing sensitive materials. It features an alphanumeric keypad with easy-to-use PIN access and is coated with a polymer layer that protects the keys and hides key usage by analyzing fingerprints on the keys. The drive also has a built-in rechargeable battery that eliminates the need for software to initially unlock the drive, and can be connected to any device that supports USB Type A mass storage devices – allowing attorneys and firms to share the drive that may be using different platforms and operating systems. Trusted internal or external parties.

Leave a Reply

Your email address will not be published. Required fields are marked *