{"id":5252,"date":"2021-04-13T14:23:52","date_gmt":"2021-04-13T14:23:52","guid":{"rendered":"https:\/\/stash.global\/?page_id=5252"},"modified":"2021-12-23T14:33:51","modified_gmt":"2021-12-23T14:33:51","slug":"legal","status":"publish","type":"page","link":"https:\/\/stash.global\/industries\/legal\/","title":{"rendered":"Legal"},"content":{"rendered":"\t\t
Firms that hold intellectual property, merger and acquisition, commodity investment, contract negotiations, market deals, and family and personally sensitive data are phenomenally attractive. The risk is as real for small firms as the largest firms.<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Law firms are facing increasing external cyber-attack as well as insider threats. Criminals, nation state actors, and even interested commercial parties are attracted to the crown-jewel types of data with which firms are often entrusted. As law enforcement warns, law firms in general are more lax on security than the corporations they represent. As the Solar Winds hack <\/span>showed, even sophisticated firms can be hacked with devastating impacts on their reputations as trusted advisors to large companies or high net worth individuals with closely held secrets. The consequences of breach can be firm-destroying with massive financial and even political consequences for clients.<\/span><\/p>\n At a recent ABA seminar, experts urged the creation of a cyber-aware culture, the running of readiness assessments, obtaining cyber risk insurance, etc. But common to all the advice was the need for forms to encrypt data, test their backups, partition and limit data to only those who need access – “Rely on multiple layers of data protection that deliver pervasive use of encryption and strong authentication”. This is where STASH\u00ae<\/span><\/span> comes in.<\/p>\n Firms that hold intellectual property, merger and acquisition, commodity investment, contract negotiations, market deals, and family and personally sensitive data are phenomenally attractive. The risk is as real for small firms as the largest firms.<\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tConsequences of breach can
be firm-destroying
<\/span><\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t