legalworkspace-infographic 0116
TRANSCRIPT
WE HAVE BUILT A FORTRESS TO PROTECT YOUR DATA & APPS.
Here are some (but not all) of the key defenses:
Data not stored on any remote device: applications and data only accessible when logged in to Legal Workspace
Two data centers located near our offices in Colorado and Texas with private, secure connection between the two sites
Private hardware that can only be accessed by our specially trained personnel—no third party has access to your data
Physical access through logged multi-factor identification; video recording of the equipment housing your data and applications
Encryption of data both in transit and at rest
Two-factor authentication for clients to access their environments
Monitored Intrusion Detection and Prevention Systems (IDPS)
Logged access to all files, folders and resources in the data center
Aggressive updates of all firmware and software
reported downtime or loss of billable hours
of the biggest 100 law firms have had some sort of breach
someone loses a laptop in the US
report using encryption on smartphones
reported infections with viruses/spyware/malware
reported using encryption for privileged e-mails sent to clients
report the use of full disk encryption
report use of intrusion prevention systems
reported that use of file encryption is higher than full disk
LEGAL TECHNOLOGY SURVEY STATISTICS
42%
Every minute,Every minute,
30% 30%
80% 80% 42% 42%
42%
22% 22%
35% 35%
14% ONLY
14% ONLY
20% ONLY
20% ONLY