How to Choose the Best Cybersecurity Company for Your Law Firm
John Britton is a cybersecurity expert. With over 13 years of experience, he now works as the Technical Director of Cybersecurity at Corvid Cyberdefense. With the COVID-19 pandemic, many companies quickly pivoted to a remote workforce and needed a new kind of cybersecurity support. Everyone working from home also caused an abundance of different types of cybersecurity threats and potential vulnerabilities."In a whole 365 days, we've gone from being a traditional model to now being a very flexible, adaptive control mechanism that needs to be in place which, in the history of cybersecurity or IT as a whole, has never happened," John says.In this episode, John discusses the different ways law firms can protect their sensitive data and avoid security breaches, including setting up a protected VPN as well as taking into account additional wifi-connected devices employees (or their kids) could be using at home.With hackers constantly scanning for vulnerabilities, it's not enough anymore to just set up IT one time and forget it. It's important to keep a cybersecurity firm on board so they can constantly future-proof your business from data breaches, hackers, and spoof websites and emails.His advice for choosing a cybersecurity firm? Avoid firms that use buzzwords like AI and machine learning — they're making it sound more complicated than it already is. What it really boils down to is being confident in that firm's abilities and asking them what they would do if a worst-case-scenario breach happened. John's top suggestions for law firms to protect themselves online is to use complex passwords, enable multi-factor authentication when possible, use a password manager to keep track of your expertly-written passwords, and provide training and awareness for your employees. 👉 Featured Guest👈Name: John BrittonWhat he does: As the Technical Director of Cybersecurity at Corvid Cyberdefense, John oversees the implementation and support teams, helping them protect organizations of all sizes from cyberattacks.Company: Corvid CyberdefenseWords of wisdom: “I'm not trying to scare the hell out of everyone but, realistically, for the SMB world — as we very well know because that's where we service — to truly defend yourself, there's no 100%. But, there's a lot of 99.9% security and mechanisms that can be in place."Where to find John: LinkedIn💡 Key Ideas 💡Lessons learned on this episode★ VPNs are important for legal firms to protect sensitive data — Without a VPN set up, remote employees are vulnerable to hackers trying to steal their data and trick them with legitimate-looking websites. Setting up a VPN, and specifically, one that connects a user behind a protected firewall is crucial to the safety of your legal firm's cybersecurity.★ Hackers are constantly scanning for vulnerabilities — While your business might not be directly targeted, hackers are constantly scanning devices, passwords, and softwares for potential vulnerabilities they can exploit. All it takes is one computer that wasn't updated, or one password that's easy to crack.★ "Set it and forget it" cybersecurity doesn't work anymore — There are so many different ways hackers are trying to exploit vulnerabilities that it takes a lot of work for cybersecurity firms to stay on top of it and make sure everything within your business is secure. The old method of a one and done approach to cybersecurity no longer applies.🔆 Episode Highlights 🔆[5:13] Pivoting quickly to work-from-home technology needs: John discusses how his business quickly adapted to remote work at the beginning of the COVID-19 pandemic. He shares how they helped small organizations quickly scale their work from home infrastructures.[7:48] VPNs explained: In layman's terms, John explains exactly what a Virtual Private Network (VPN) is and how it works to protect and encrypt data that's transmitted over the internet.[13:18] How hackers threaten you: Learn about the different ways hackers search for vulnerabilities with your technologies, whether it's a previous data breach or an old version of specific software.[22:36] The ideal cybersecurity solution: Zero-touch security is the near-perfect balance for how a cybersecurity firm should work together with a business. John explains what it is, how it works, and why it's the ideal solution to keep your business safe.[26:19] Should you use an on-premise server?: John compares using an on-premise server (the traditional method) to utilizing cloud storage, addressing the strengths and weaknesses of each.[29:27] When hackers target the legal industry: John discusses the types of cyberattacks that have become more prominent in the legal industry and how to safeguard against them.[35:43] How to vet cybersecurity firms: John covers what to ask potential cybersecurity firms and how to find one that genuinely wants to help versus just wanting to make money without genuinely protecting your business.🎙️ Learn more about Lawpods 🎙️To launch your law podcast or learn more, visit the Lawpods website.Engage with us on social media: Facebook, LinkedIn, Twitter, & Instagram.Do you know someone who’s staying on top that should be a guest on the show? Submit their name to firstname.lastname@example.org.Stay safe, stay healthy, and stay profitable.