Peer to Peer Magazine

September 2012

The quarterly publication of the International Legal Technology Association

Issue link: http://read.uberflip.com/i/80353

Contents of this Issue

Navigation

Page 27 of 127

Many of the biggest IT security risks center on mobility. Like IT users everywhere, law firm employees are taking advantage of smartphones and tablets to stay connected, work remotely and be more productive. In addition to using whatever devices IT has provisioned, employees are using devices they've brought from home, including consumer devices like Android phones, iPhones and iPads. They're also sharing data, including confidential files belonging to the firm, across all these devices. Suddenly, case matter is showing up beside vacation photos and recipes on mobile devices that travel from home to the gym, to the office, to court and back home again in a single day. Law firms must keep data secure on every device at every location. Firms should be wary of popular, consumer-class file-sharing services like Dropbox. Users like these services because they make it easy to sync files across mobile devices. But these services lack the rigorous security controls and centralized administration that businesses like law firms need. (IBM recently banned Dropbox from all its networks.) Firms should look for enterprise- class file-sharing and file-syncing solutions that protect data and enable IT administrators to control and track the distribution of confidential files. Here are some best practices for keeping IT, whether mobile or stationary, secure. 1. Make security comprehensive. Invest in platforms that support multiple mobile platforms, including iOS, Android and BlackBerry, and ensure that whatever you're deploying in the next few years will support tablets (especially the iPad) and smartphones. Leave no device unprotected. 2. Make security easy-to-use. A difficult system is a system that employees will try to work around. Don't tempt them. 3. Deploy a mobile device management (MDM) solution to enforce device-specific controls and policies for all mobile devices. 4. Deploy a secure mobile file-sharing solution that complements the MDM solution and supports secure file-syncing across devices and secure file transfers. For added security, deploy the secure mobile file-sharing solution in a secure environment, such as a private cloud environment, owned and managed by your firm. 5. Integrate the mobile file-sharing solution with your enterprise infrastructure, such as LDAP/AD, and enterprise content management (ECM) systems, such as SharePoint or iManage. 6. Block consumer-class services such as Dropbox to close "back-doors" that circumvent security controls and jeopardize data security. 7. Educate users about the risks of mobile file-sharing, downloading unapproved applications and responding to official-looking email messages from unfamiliar sources. Encourage them to follow best practices and to use approved tools. Volunteer Positions ILTA It is no accident that ILTA makes mention of the term "volunteer" in so many different places. The spirit of volunteerism runs deep and wide within the association; in fact, ILTA was created by a group of volunteers, is led by volunteers, and still holds as its singular mission addressing the specific educational needs of its members through the voices of volunteer leadership. ILTA fosters, relies on and celebrates volunteers for their real-world experience and their value as a resource for colleagues. Volunteerism takes on many forms and ranges from something as simple as sharing an idea in one of the community forums (the e-groups) to officer-level commitment of running one of the organization's core programming delivery teams. The opportunities ILTA provides can deliver great benefits to both the individual volunteers as well as to their firms/ organizations. We continually seek committed, energetic individuals who have a passion for learning and peer- networking. Read more about the qualifications for service and the responsibilities of each position at www.iltanet.org/specialpages/ Volunteer-Job.aspx. Peer to Peer 29

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - September 2012