ANALYSIS: Using Legal Tech More Could Allay Ransomware Concerns

While ransomware attacks are a common problem facing law firms and legal departments, the use of cybersecurity and business continuity technology tools is rarely used. Increased use of these tools by law firms and legal departments could help them combat these cyber threats and allay their concerns.

In Bloomberg Law’s Legal Technology Survey 2021, respondents in law firms and legal departments were asked how concerned their companies were about ransomware attacks. A sizable 89% of respondents identified as Senior Lawyer (defined as Partner, Of ​​Counsel, Senior Counsel, Principal, Equity Owner, General Counsel, or Chief Legal Officer) said their companies were either somewhat or very concerned about Are ransomware.

When survey participants asked what legal technology tools they or employees in their organizations were currently using, the data revealed a surprising discrepancy. Only 39% of senior lawyers said either they or someone in their company used privacy / cybersecurity tools and only 19% said they used business continuity / disaster recovery tools.

If concerns about ransomware are so high, why are these tools rarely used? Due to competing responsibilities and time constraints, attorneys may not have the bandwidth to learn or use these tools. In addition, senior attorneys may not even be aware that their organizations have legal tech tools in place that address these issues – and are used by IT.

Lawyers and organizations should seek to use more privacy / cybersecurity tools and business continuity / disaster recovery tools, or at least confirm that IT or other appropriate technical staff are implementing these tools to combat ransomware attacks. The more they use these legal technical tools, the better equipped they are to prevent and respond to ransomware. Ultimately, this increased use could serve to allay concerns both within the company and among customers about the vulnerability of these companies.

Bloomberg Law subscribers can find more related content on our How-To: Privacy, Cybersecurity & Technology and How-To: Privacy Breach pages.

If you are reading this in the Bloomberg terminal please run BLAW OUT to access the linked content, or click here to view the web version of this article.

Comments are closed.