Cyber security is not just a concern for IT managers
Regulatory Changes All Legal Partners And Senior Managers Should Be Aware Of
2019 has been an overwhelming area of transition for the United Kingdom (UK). A definitive break from the EU has already been delayed once with a further extension unlikely.
Amidst this uncertainty, regulators have considered the future of the legal sector and updated their regulations accordingly which have impacted many operating areas within a law firm.
With so much change and potential pain points already influencing the day to day activity of a law firm, it is understandable that cyber issues may be overlooked and passed to the experts dealing with the protection of digital assets.
However, these issues permeate through to all stakeholders within a law firm and managers and senior leaders need to be aware of how cyber crime and its prevention is a whole firm issue.
The legal sector has been a particular target of cyber criminals in recent years. In 2018, the Solicitors Regulation Authority (SRA) speculated that £11 million was lost to cyber crime. This figure has grown exponentially as the reach of cyber criminals has proliferated into most areas. According to Action Fraud, more than £364 million was lost through UK victims falling foul of sophisticated social engineering and impersonation tactics by the end of 2018.
In order to regulate the digital safety of UK law firms, a plethora of regulators have updated their regulations. The SRA’s new Standards and Regulations, set to be rolled out in November, place a greater cyber compliance emphasis on the Compliance Officer for Legal Practice’s (COLP) role.
The COLP will now experience broader compliance responsibilities including safeguarding the law firm against cyber threats and the increasing difficulty in preventing issues caused by human error.
The Conveyancing Quality Scheme (CQS) reflected the increasing cyber threat by amending and including a number of their Core Practice Management Standards (CPMS).
Section 6.2 insists that all accredited members should ensure that their firm embraces cyber security accreditations, like the Government backed Cyber Essentials.
Similarly, the Law Society’s Lexcel England and Wales Version 6.1 Standard for Legal Practices expects law firms to adequately safeguard against cyber threats by creating robust policies, approaches and defences. Again, Cyber Essentials is recommended as a minimum standard.
Safeguarding Reputations and Data
Unfortunately, UK organisations are still struggling to fully embed a thorough cyber security culture, according to a recent Government survey into cyber crime.
The ‘Cyber Security Breaches Survey 2019’, released by the Department for Digital, Culture, Media and Sport found a number of policy omissions desperately needed to protect a firm and their clients from the clutches of cyber criminals.
Only one third of UK businesses have created a cyber security policy within their organisations with little over a quarter (26%) training staff to spot the signs of cyber crime. Fewer than a third of organisations had also planned for a data breach.
If an attack succeeded, around three quarters of UK firms would be unable to easily take preventative measures to ease the issue. This leaves a firm open to scrutiny which may severely damage a reputation that takes so long to build. Law firm managers considering these issues and building a thorough cyber security policy could prevent attacks and also minimise the damage if the worst happens.
Whilst law firm leaders could benefit from taking a more active role in cyber policies, law firms also need to consider and scrutinise the threat from third-party security policies. Only 29% of the 6,600 IT and global organisation leaders had considered the cyber security processes of the suppliers and third parties they work with, according to a recent ‘Tech Vision Report’.
Morbidly, the report speculated that 25% of all global attacks will be attributed to supply chain attacks by 2025. Increasingly, consumers and regulators will expect a law firms’ internal processes to be robust, but they will also expect cyber due diligence to focus on how symbiotic organisations protect their data from unscrupulous digital criminality.
Planning for GDPR
Since the General Data Protection Regulations (GDPR) came into force in May 2018, evidence suggests that UK businesses are struggling to fully adapt their policies and protocols to ensure they are compliant.
Auditing firm RSM found that 30% of European businesses believe they remain uncompliant with GDPR, 13% are unsure if their approaches are compliant and 38% are unsure or are failing to comply with the new regulations.
The Information Commissioner’s Office (ICO) were inundated with four times more data breaches in the year since GDPR was introduced as UK firms look to embrace their responsibilities and disclose a breach within 72 hours of its discovery.
In the year to June 2019, over 14,000 data breaches were disclosed to the FCA.
However, 41,054 complaints were made to the ICO with GDPR savvy consumers unhappy with how their data was being used and stored by UK organisations. Big businesses, like British Airways and Marriot as well as the Metropolitan Police have been issued with fines and warnings for potential data breaches.
Whilst many firms may have become compliant with storing and protecting data, policies on satisfying data access requests, were of particular concern. Two thirds (63%) of UK businesses had reported a significant rise in requests by the public for the data a firm holds on them, according to Parseq.
87% of organisations have failed to reply to data access requests within the allotted time limit, resulting in significant delays which will lead to fines.
Whether it be through adapting policies to comply with GDPR, ensuring a law firm embraces robust cyber policies or just looks at existing practices to ensure a law firm is compliant with regulatory changes, senior members of a law firm need to embrace and permeate a cyber secure culture within their firm. This can only happen by embracing a hands-on approach.
Here at The Cashroom, our team of qualified and experienced legal cashiers and the sophisticated processes and procedures we implement can help firms to manage these risks, while benefiting from our efficient, cost effective finance services:
- We communicate with our clients via our secure Cashroom Portal.
- We have Cyber Essentials Plus accreditation.
- We have rigorous GDPR and data policies in place.
- SOC Manager. SC Clearance. Immediate opportunity.
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
- Security engineer. Financial Services. UK. Permanent
CH7863 Security engineer. End User . Financial Services Security Engineer needed to monitor and manage a security suite of tools within an End User environment. The Security Engiener will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.