Solutions
Essential Ransomware, Malware, Virus Protection and Software Vulnerability Monitoring
Pallas was Athena's mother, she provided Athena with the Aegis as a gift or symbol of their close relationship. Its name symbolizes the close and personal relationship our experts have with your business's cyber security security needs. This package includes 24/7 monitoring for each device on your network and you are notified automatically as soon as new vulnerabilities are detected. Upon request we will assist you with mitigating or patching the affected devices in your business based on risk and severity.
Starting with The Nevada Supreme Court Rules of Professional Conduct Rule 1.1 lawyers must “provide competent representation to a client,” which requires the exercise of the “legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.” This makes clear that part of this duty of competence requires that lawyers keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology. Rule 1.4, Rule 1.6, and Rule 1.9(c)2 if a data breach occurs. Rule 5.3 also requires cyber security consideration for access to sensitive digital systems or data for it must encompass individuals like paralegals and IT staff ensuring they are also compliant with the professional conduct rules.
The ABA Model Rules of Professional Conduct follow suit with Rule 1.1, 1.4, 1.6., 1.15, 5.1 and 5.3. Furthermore, ABA Formal Opinion 483 addresses lawyers' obligations after an electronic data breach or cyberattack. It reviews lawyers' duties of competence, communication, confidentiality, supervision, and safeguarding client property in protecting confidential data. It discusses the duty to monitor for a breach, stop a breach and restore systems, determine what happened, and communicate with current clients concerning a material loss or compromise of information relating to a client. This expanded upon Opinion 477R we discussed in our blog.
As such an incident response plan should be in place to address identifying and evaluating potential network anomalies or intrusions; determining whether any data or information has been accessed or compromised; quarantining threats or malware; preventing exfiltration of information; eradicating malware; restoring the integrity of the firm's network; and minimizing loss or theft of information and disruption of services caused by incidents.
To do this implementing internal policies and procedures designed to safeguard confidential client information and critical business systems is essential. But alone that isn't sufficient. The use of tools to monitor technology resources for unauthorized access or intrusion (including those maintained by external vendors) must be continuous and proactive.
To provide appropriate oversight for any lawyers and non-lawyers concerning information technology and information security, competent lawyers must employ reasonable efforts to monitor technology trends, respond promptly to actual or suspected breaches and investigate incidents to identify lost or accessed data. They also have a responsibility to restore computer operations and ensure the integrity of their network by finding the root cause.
This can be time consuming, nuanced and requires experience with specialized skills to perform that most IT companies or Managed Service Providers lack in breath and depth since it is outside of their scope of business by definition. See our blog post to see why this is.
Cyber Security Solutions for Nevada Law Firms
Nevada Law Firms Require Cyber Security With Native Nevadan Experience
About Our Services
We are a leading provider of managed cyber security services for Nevada based small businesses. With our expertise, we help protect your sensitive data and ensure the highest level of security for your small business.
We offer tailored cyber security solutions to meet unique needs of small businesses like yours. Our team of experts will work closely with you to ensure your security is never compromised.
Tailored Security
See our Blog Post on 2024's Cyber Security Challenges Small Businesses OR schedule a complementary General Cyber Security Assessment with us now!