Ensure your chosen solution provides support for legacy systems. While most solution vendors are proud to support the latest operating systems, there are many larger firms that still rely on legacy systems for various reasons. To ensure consistency of your security policies, and reduce the workload of its management and enforcement, choose a single solution that lets you uniformly manage all assets accessing your network.
2. Application Management
In 2018, it was forecast that UK adults would spend an average of three hours a day using mobile devices4 – with the four most popular consumer applications being social networks. To prevent accidental data leaks to social networks, it would be wise to contain and manage your critical business applications within a secure and encrypted environment, such as a password- restricted folder. When your employees are onsite, consider using application management to apply a kiosk-mode to display only approved applications and nothing else – users will be less distracted by irrelevant notifications from their personal applications, and ultimately more productive.
▪ Secure Access for Applications
If you restrict the hours and the range of IP addresses that your users can access corporate applications, such as Case/Practice Management Software, Digital Dictation and billing apps, it’s likely you currently use (and perhaps frequently deal with the headaches of) full Virtual Private Network (VPN) connections. With contained applications, your chosen solution should eliminate the need of complex and costly VPN connections, and automatically enable secure access to everything behind your firewall, on a per-application basis.
▪ Secure Browser
Most Law Firms will require access to the internet via a browser, of which there are many to choose from for each platform. It is important when selecting a preferred or default browser, to consider the risks associated with each type of browser, and balance this with the functionality the developer promises. For your managed devices, consider using a browser which can restrict access to websites that may contain malware, compromise device security, and even categories of websites that are irrelevant to the job at hand such as social networking or explicit sites. With a secure browsing solution, you will also be able to provide access to intranet websites without needing a device VPN connection.
▪ Secure Email
Stealing information from a Law Firms email account is a lot easier than you may think. For example, on Apple iPhone’s that have been jailbroken, an unauthorised user could gain full administrative access to the device with ease, and export emails and attachments in seconds. Ensure that you implement a solution that provides secure and fully encrypted access to your firm’s organisations email, and also offers the ability to control information and attachments within the application. The ideal setup will give you the ability to delete attachments remotely and prevent data from being moved outside of the application with restrictions against copy and pasting and screenshots.