+1-202-802-9399 U.S. Headquarters

“Law firms are the newest and softest target of cyber-criminal syndicates…*

Thycotic helps law firms protect and secure access to client data and records.

WHAT’s the challenge?

Law firms have become prime targets for cybercriminals set on stealing and monetizing confidential information, from market-moving M&A intel to sensitive patent filings. More than 60% of all breaches today involve compromised user and privileged account passwords.

WHY it’s important

According to a 2016 ABA report, 26% of large firms (500 or more attorneys) have experienced a cybersecurity breach, and 45% of all law firms reported infection from viruses or malware. Clients are demanding law firm compliance with proper cybersecurity protections.

HOW we solve it

Thycotic delivers comprehensive Privileged Account Management solutions that secure privileged account passwords, and lock down applications, endpoints and OS configurations, helping law firms meet ABA cybersecurity recommendations.

*“Law Firms Scramble to Prepare for Additional Data Breaches,” LegalTech News, April 2016

Thycotic can help protect client data with key cybersecurity controls that provide a framework for safeguarding law firm information.

Center for Internet Security, Critical Security Controls Can Help Meet
CSC1 Inventory of Authorized and Unauthorized Devices
CSC2 Inventory of Authorized and Unauthorized Software
CSC3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
CSC4 Continuous Vulnerability Assessment and Remediation
CSC5 Controlled Use of Administrative Privileges
CSC6 Maintenance, Monitoring, and Analysis of Audit Logs
CSC7 Email and Web Browser Protections
CSC8 Malware Defenses
CSC11 Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
CSC14 Controlled Access Based on the Need to Know
CSC16 Account Monitoring and Control
CSC18 Application Software Security
CSC19 Incident Response and Management
CSC20 Penetration Tests and Red Team Exercises

Try Secret Server for 30 Days

  • Free Enterprise level support
  • Choose your preferred deployment option
  • The easiest PAM Solution you’ll ever use
  Step 1 of 3

The cyber risks to law firms are accelerating

  • The largest data breach in 2016 known as the “Panama Papers” leaked 11.5 million files and 2.6 Terabytes of financial and client-attorney information.
  • A December 2016 law firm breach saw Chinese hackers use stolen information about merger deals to make over $4 million by discovering stocks about to soar in value.

Too many law firm systems remain vulnerable

2016 Technology Survey Security Summary, published by the ABA says:

  • 26% of large law firms (500 or more attorneys) have experienced a breach
  • 45% of all law firms reported infection from viruses or malware
  • <50% of law firms have formal policies in place for proper computer, internet and email use
  • Only 18% of law firms report having any type of full security assessment
  • 71% reported having antivirus on their desktop or laptops
Icon - Privilege Manager for Windows and Mac will apply applicable policy actions

Watch the Webinar
Law firms at Risk:
Why you need to safeguard privileged account credentials now

Watch security experts explain how hackers and malicious insiders target privileged accounts at law firms—and how you can implement automated security solutions that detect user compromise before sensitive assets are stolen.

Corporate counsel, and the C-suite to which they report, are becoming increasingly mindful of Cybersecurity risk. They are starting to demand that their outside counsel adhere to strict security protocols and undergo in-depth evaluations.

-Legal Tech News, May 2017

Free Solution Guide

“Securing access to client data at law firms”

 

Free White Paper

“Best practices for cybersecurity in legal services”

 

Protecting your “keys to the kingdom” with Thycotic

Privileged accounts are basically any type of administrator like account on any device connected to your law firm’s network and storing sensitive or critical data.

  • Nearly every device in your network has an administrator account on it, from your desktop/laptop, routers, switches, firewalls, and even certain types of desk phones.
  • These privileged accounts are highly targeted and coveted by cyber criminals
  • The administrator accounts (privileged accounts) on these devices must be discovered, managed, controlled, and protected

SAVE COUNTLESS HOURS!
FREE PAM Security Policies Template
for Law Firms

Privileged account credentials are a prime target of hackers, so it’s critical that you put password protection policies in place to prevent unauthorized access to government data, and demonstrate security compliance.

Editable, easily customized Microsoft Word document

See how kcura software company secures their servers and manages privileged access, shared accounts and passwords easily.

“I would definitely recommend Secret Server to a friend or a colleague. It was very easy to spin up. I think we had secrets in there, going from not even a server hosted, to having secrets in there and being used within a day.”

– CJ Wiemer, Information System Security Engineer, KCura

Thycotic software solutions automate security without requiring training or consulting

Secure Passwords and
Privileged Accounts with

Secret Server

Thycotic Secret Server gives you the simplest, easiest and most affordable way to discover, secure and manage privileged account passwords across your organization.

Protect Endpoints and
Control Access

Privilege Manager

Thycotic Privilege Manager for Windows and Mac protects endpoints from malware and enforce least privilege policies to shield applications and systems from malicious access.

Ready to get started? Get Your 30-day Free Trial

Secure Your Passwords

Start Your 30-Day Free Trial Secret Server

Protect your Endpoints

Start Your 30-Day Free Trial Privilege Manager

Or call us at 1-202-802-9399