Why Automated Sensitive Data Catalog
A common misconception is that IT teams can manually compile a list of sensitive data
An extremely popular New York-based Entertainment and Media Lawyers’ firm- Grubman Shire Meiselas & Sacks, fell victim to a ransomware attack in May 2020. The attackers demanded a huge ransom of over $20 million. They threatened to leak over 750 GB of sensitive information belonging to popular celebrities, such as AC/DC, Robert De Niro, Lady Gaga, and many more if the firm denied to pay up the ransom. The attackers even doubled the ransom amount soon after and threatened to leak dirty secrets about President Donald Trump.
Data-centric attacks are fast becoming commonplace in the legal industry given the huge amount of sensitive information that it handles. As seen in the above case, when attacks are launched at such big-name firms that service a long list of international celebrities, the ransom amount also goes up.
Every other industry that collects and handles sensitive information needs a data security system in place. But lawyers and law firms constantly handle critical client information that forms the very foundation of their business. The onus of keeping such critical information safe is on the firms and they are also bound by ethical and commercial obligations. This makes them all the more vulnerable to data-centric attacks and hence an efficient data security system is vital to their industry.
Why does the industry attract hackers?
As mentioned above, every industry that manages sensitive data is prone to data security attacks. Now let’s find out why the legal industry is all the more vulnerable to such attacks:
-criminal records of clients
-financial information pertaining to their clients (corporates, high-profile clients, etc.)
-confidential attorney-client privileged documents
-critical patents
-evidence in the form of documents
-confidential emails containing private client information that can be damaging if compromised
-tax files
-trade secrets
-litigation documents, and many more.
The aforementioned information is available in every law firm’s electronic device (laptops, personal computers,etc.) and network. Data hackers either hack into their networks or steal such devices that are full of organized and categorized sensitive information.
Data hackers launched attacks on five law firms between October 2019 and January 2020. The hackers also leaked the stolen data which consisted of extremely sensitive information, such as veteran’s injury and mental trauma entries, healthcare records, legal fee documents, privacy consent documents, etc.
Below is an example of one such entry-
One such 2015 landmark data breach compromised around 11 million documents from Mossack Fonseca- a law firm in Panama. More than 100 investigations were launched in more than 70 countries due to the disclosure of some of the world’s wealthiest assets due to this data breach.
The primary reason behind this massive leak was cited to be outdated security practices in the law firm’s websites. The firm hadn’t updated its mail services since almost 6 years before the incident and didn’t encrypt emails.
Mossack Fonseca ended up closing shop two years post the breach owing to heavy reputational and monetary loss. The magnitude of the breach was such that the case was even made into a film that hit the screens in 2019, titled “The Laundromat”, and starred Meryl Streep in it.
In 2016, hackers hacked into the email account of a small law firm in Texas and sent out an email that contained malware. The malware could access the financial records of the recipients and cost the sensitive information of thousands of individuals.
Motives behind data breach in Legal firms
Data hackers share a set of common motives behind hacking information from any industry, and financial gains often tops the list. Whilst the attacks to the legal industry also carry the same motive, let’s also understand the other specific reasons that motivate hackers to target this sector. They are:
Insider threats are notoriously common across industries and are committed by former employees or disgruntled workers who carry a grudge against the company.
In a string of attacks launched in 2016 at more than 45 law firms situated at the Wall Street- USA, the hackers minted over $4 million. A few of the most notable firms that fell prey to these attacks were Cravath, Swaine & Moore, and Weil Gotshal & Manges.
The aftermath of a data breach in the legal sector
A law firm that has gone through a data breach has to face a variety of consequences- the major one being the compromise of sensitive data. The others are
-reputational damage
-loss of client trust and brand value
-loss of current and prospective clients
-destruction of attorney-client privilege
-financial loss
-disciplinary legal action
-criminal charges
-penalty
-malpractice allegations by clients
-unplanned downtime
-loss of productivity and billable man-hours
-replacement of electronic devices/internal network
-business disruption, and many more.
An efficient data security system can save you from all of the above by discovering, securing, and monitoring your sensitive data at all times.
How can you secure your firm against hackers and data-centric attacks?
Take a look at what a few of the most promising practicing lawyers and data security experts have to say about safeguarding a law firm’s data:
“Perhaps the easiest thing law firms can do is to put data in the hands of experts (and understanding that those experts are not attorneys).”- Jared Staver- Attorney and Managing Partner at the Chicago-based Staver Law Group.
“Second, there are now some good products available for tagging and controlling the data themselves, rather than merely providing network defense. These programs help classify information assets and then provide various levels of protection.”- Jeff Stollman- supports the United Nations Commission on International Trade Law (UNCITRAL) and a member of Mentors Guild.
Now that we’ve understood and recognized the importance of an expert, comprehensive data security solution in legal firms regardless of their size, let’s take a look at the laws and regulations that govern the data privacy and security at these firms:
Among the many regulations that govern the privacy and security of sensitive data in law firms, the following are the major ones-
The Legal Industry must also comply with the Health Insurance Portability and Accountability Act (HIPAA) as it also collects PHI/ePHI (Protected Health Information/electronically Protected Health Information) of its clients, and partners among others. A HIPAA audit assesses your institution’s ability to protect the PHI/ePHI against its compromise.
Since the legal sector handles a variety of health data, it is a must that it complies with HIPAA to avoid violation and therefore huge penalties that come along with it. Kogni discovers, secures, and monitors your PHI/ePHI regardless of its location in your data landscape and can help accelerate HIPAA compliance.
Below are the key HIPAA requirements that Kogni can address to achieve compliance-
Kogni discovers all your HIPAA-related sensitive data regardless of their location. It then classifies the data under preset groups created by Kogni or custom groups created to suit your institution’s unique needs. It makes identifying the data location simple at any given point of time by adding tags to your data and mapping it across users, folders, and permission. May your PHI/ePHI be in a database, filesystem, No-SQL, Big Data, or anywhere across your institution’s data landscape, Kogni helps you locate it in no time. Kogni also supports data in various formats like structured, semi-structured, and unstructured.
Kogni monitors both data at rest and real-time data no matter where they reside and offers unified single-pane visibility to your data. It is also uniquely positioned to identify and report on your critical data that reside in SaaS (Slack, Jira, Salesforce) and other hosted services.
Kogni monitors various enterprise channels such as files, folders, emails, etc. This allows entities visibility into how authorized business units interact with their HIPAA database. Our enterprise data security tool continuously monitors for deviations based on risk patterns and alerts your institution to prevent data misuse from turning into a full-blown data breach.
Kogni helps your institution architect a robust analytics process. It tracks your HIPAA-related data’s activities like location, state, alterations it goes across your entity’s data landscape, its interaction and activities when in your cloud environments, etc. It then logs the potential threats attached to your PHI/ePHI and notifies by sending out appropriate alerts.
Kogni also offers other expert capabilities to accelerate your HIPAA compliance-
-when an authorized user accesses your ePHI from a different geographic location
-when they interact with a never-before-accessed HIPAA-related information
-when they log in from a system that does not have the required client-based certification or when in an unsafe network zone
2. Gramm Leach Bliley Act (GLBA)
GLBA regulates the security of customers’ information in the financial sector. Since the legal sector stores and handles troves of financial information, be it of its clients, partner firms, or employees, it must also comply with this act.
The Financial Privacy Rule under the act requires all organizations collecting sensitive financial information to provide customers with a privacy notice detailing
-the type of information collected about the customer
-where it is being stored
-how it is used
-where and with whom it is being shared, and
-how it is being protected
The notice also requires firms to notify customers of their right to opt-out of sharing their sensitive information.
All of the above and more can easily be executed with Kogni’s expert data security solution by your side. Anytime a consumer requests to access/opt-out of sharing their data, organizations leveraging Kogni’s powerful data discovery feature can pull up the data instantly from all available data sources.
Under GLBA’s Security and encryption requirements, organizations collecting financial data must encrypt their sensitive data to mitigate the risk of data compromise or tampering when stored or transmitted. Encrypting your sensitive data is a robust step against data compromise. Even if hackers manage to hack into your system, without a decryption key, they will not be able to decode the information that lies within. Read our blog on Why is Data Masking imperative to your Data Security Strategy? to understand the importance and types of data masking.
3. Payment Card Industry Data Security Standard (PCI DSS)
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard that applies to organizations that collect, store, and use sensitive financial data such as the legal sector.
Your payment card information could be at considerable risk when you make a payment through your mobile, internet, or at an e-cash payment counter. When you make a payment by swiping your card, the card information passes multiple systems to transfer the payment. There are significant chances that the unencrypted information in your card gets exposed while navigating through multiple phases of the money transfer process, such as storage, processing, and transmission.
The identification of this unencrypted data is an important clause under 3.1 of the PCI DSS Standard. It is imperative that firms adopt the right solution to discover data such as card details, that may reside in undisclosed locations within their data landscape. Kogni, a powerful data discovery and security solution can help organizations pull up sensitive data from anywhere across their data landscape.
Also, per requirement 3.1 of the PCI DSS Standard, organizations, on a quarterly basis, must discover and erase cardholder data that exceeds defined retention parameters in a secure manner. To achieve this, they must ensure the following-
-Organization-wide data scanning and discovery: An organization’s data landscape may contain many undisclosed data storage pockets. An effective data discovery solution, such as Kogni carries enterprise-wide data scanning capability and leaves no storage area unscanned. It collects sensitive information (cardholder data, in this scenario) from all available data sources and not just the ones that contain information related to payment cards.
-Data discovery across data formats and sources- A comprehensive Data Discovery Solution must have a 360-degree data identification range. This enables the solution to identify sensitive data from anywhere, any data source, format or type across your data landscape.
Kogni’s Sensitive Data Discovery Software explores different repositories including cloud, on-premise, and third-party controlled storage centers, for unknown, sensitive and critical information.
Its predefined data sources include Amazon S3 bucket, Amazon RedShift, Oracle, Sybase, SQL Server, Informix, Postgre SQL, Office365, MySQL, MongoDB, Google Drive, and many more.
4. General Data Protection Regulation (GDPR)
The European parliament’s efforts to protect its citizens’ data, gave birth to the much-awaited General Data Protection Regulation (GDPR). The law applies to each member state under the European Union and aims to create a data protection strategy that covers both consumers (parents and students in this case) and their personal data.
Kogni, the data-centric software’s GDPR-compliant features enable institutions in the legal sector to discover sensitive data in their data sources, secure data as it is ingested and continuously monitor data sources for possible breach and policy violations.
Kogni, with its automated sensitive data discovery, is uniquely positioned to help institutions adhere to GDPR within an accelerated time frame. Its data loss prevention mechanism for GDPR helps institutions secure their sensitive data.
5. The California Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA) is a much-needed law that favors customers’ right to data privacy. The law gives customers rights concerning the collection and usage of their personal information.
CCPA applies to any organization, all over the globe, that collects and uses the data of California inhabitants.
Institutions must take a comprehensive approach to CCPA compliance by implementing an all-inclusive enterprise data security tool, such as Kogni. Kogni can help them track the location and purpose of their customers’ personal information. It helps customers exert their rights to information, portability, erasure, etc., They can also manage opt-outs when they no longer consent to the sale of their personal information.
Kogni’s uncomplicated and cost-effective Sensitive Data Security Solution is easy to implement and is a comprehensive approach to your Data Security strategy. Leave it to Kogni to efficiently automate your Data Discovery, Classification, Security, and Compliance!
Explore Kogni’s 24/7/365 expert sensitive data discovery, security, and monitoring capabilities for free for 90 days.