{"id":12200,"date":"2024-09-18T15:45:43","date_gmt":"2024-09-18T19:45:43","guid":{"rendered":"https:\/\/360legal.net\/blog\/?p=12200"},"modified":"2024-09-18T16:07:12","modified_gmt":"2024-09-18T20:07:12","slug":"information-security-the-cfpb-and-process-serving","status":"publish","type":"post","link":"https:\/\/360legal.net\/blog\/information-security-the-cfpb-and-process-serving\/","title":{"rendered":"Information Security, The CFPB, and Process Serving"},"content":{"rendered":"<article>As the owner of a client-first company, I&#8217;m always on the lookout for how other companies measure up and whether they are Client-First. So, what could Information Security, the CFPB, and Process Serving possibly have in common? Well, let me tell you.<\/p>\n<div id=\"attachment_11543\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.360legal.net\/about\/360legal-about-ceo-weaver.html\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11543\" class=\"size-full wp-image-11543\" src=\"https:\/\/360legal.net\/blog\/wp-content\/uploads\/2024\/02\/Mike-Weaver.jpg\" alt=\"Mike Weaver, President of 360 Legal, expert in legal services information security\" width=\"300\" height=\"450\" srcset=\"https:\/\/360legal.net\/blog\/wp-content\/uploads\/2024\/02\/Mike-Weaver.jpg 300w, https:\/\/360legal.net\/blog\/wp-content\/uploads\/2024\/02\/Mike-Weaver-200x300.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-11543\" class=\"wp-caption-text\">Mike Weaver President 360Legal<\/p><\/div>\n<h2>The Evolution of Information Security in Legal Services<\/h2>\n<p>As some of you may know, I have a background in Information Security. In the late &#8217;90s, I was part of a dedicated team specializing in information security technology solutions for the government, primarily the Department of Defense. One of my proudest achievements was leading the initiative to engineer and deploy the first global VPN network using the commercial Internet for the U.S. Air National Guard. Today, VPNs (Virtual Private Networks) and blazing Internet speeds of 200Mbps or higher are commonplace. However, in the late &#8217;90s, VPNs were a novel concept, and typical Internet speeds were measured in Kbps rather than Mbps\u2014remember the days of dial-up? My point is that technology has made significant strides over the past two decades. Unfortunately, one aspect that hasn&#8217;t improved is Internet safety. As technology has advanced, so have the capabilities of the Blackhat community, which has leveraged increased bandwidth and sophisticated AI tools to amplify its disruptive efforts. Recently, those of us in the legal services industry have been reminded of the persistent threat of information security breaches and ransomware attacks.<\/p>\n<h3>From VPNs to Modern Cyber Threats<\/h3>\n<p>A decade or so ago, hackers, or BlackHats, had an abundance of targets to choose from. If you were a small or low-profile firm, you didn&#8217;t have to worry as much about Internet intrusions or ransomware; larger companies and easier targets were their primary focus. A basic firewall was often enough to deflect attackers toward less protected networks. However, the democratization of technology and bandwidth has made it easier for hackers to target large swaths of domain names and IP addresses using AI. Today, even someone with basic knowledge, a $200 laptop, or a mobile phone and an Internet connection can pose significant information security challenges for companies.<\/p>\n<h3>The CFPB&#8217;s Stance on Data Protection<\/h3>\n<p>To add to the complexity of Information Security, the <a href=\"https:\/\/www.consumerfinance.gov\/compliance\/circulars\/circular-2022-04-insufficient-data-protection-or-security-for-sensitive-consumer-information\/\" target=\"_blank\" rel=\"nofollow noopener\">CFPB weighed in on August 11, 2022 with Circular 2022-04<\/a> that asked the question: &#8220;Can entities violate the prohibition on unfair acts or practices in the Consumer Financial Protection Act (CFPA) when they have insufficient data protection or information security?&#8221; As you can imagine, the answer the the CFBP provided was YES! So as an attorney, firm operations manager, or paralegal, you should be very concerned. Not only do you have the regulatory oversight of the CFPB, but consider the volume of interactions your high-volume <a href=\"https:\/\/www.360legal.net\/collection\/collection-law.html\">Debt Collection<\/a>, <a href=\"https:\/\/www.360legal.net\/foreclosure\/foreclosure-law.html\">Foreclosure<\/a>, or Personal Injury firm has with defendants or other civil parties over a year, five years, or ten years. Many of these interactions likely leave the defendants less than satisfied, right? Your firm deals with hundreds of defendants weekly and represents numerous high-profile banks, servicers, and commercial entities.<\/p>\n<h3>The Real Cost of Information Security Breaches<\/h3>\n<p>Imagine the impact on your business if you were hit with a ransomware attack. I&#8217;ve seen several firms go through this ordeal, and many try to resolve it by restoring the latest &#8220;uninfected&#8221; backup. But what if the hackers are smarter this time? What if the ransomware is so invasive that it infects your backups as well? How long could your operations be down? Once news of your security breach spreads, how many clients would you lose?<\/p>\n<p>The silver lining is that the technology to prevent malicious attacks is neither expensive nor difficult to deploy and maintain. What is costly and time-consuming is dealing with the aftermath of an intrusion. Do you have the internal resources and expertise to fully remediate? Even if you do, how can you be sure that everything has been thoroughly cleansed? If not, what critical elements might you overlook?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-12204\" src=\"https:\/\/360legal.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-Security-in-Process-Service.jpg\" alt=\"Cyber Security measures in Process Service for law firms\" width=\"300\" height=\"200\" \/><\/p>\n<h3>Why Your Legal Vendor&#8217;s Security Matters<\/h3>\n<p>As we have seen recently, the unfortunate reality is that many of the vendors you rely on probably don&#8217;t prioritize YOUR information security. When was the last time a Legal Service vendor or a third-party provider discussed your information security when they began working with your firm? A typical SOP vendor might boast about their speed in serving or e-filing your documents. They might even claim to be secure as they hand you their latest SOC-3 audit results and assure you that everything is in order. But that SOC-3 Audit was from January, and now it&#8217;s almost October\u2014are they still secure? Never mind them; you are the Client, right? What about your data? Do they have the expertise and technology to protect your information or even to secure their connection to you?<\/p>\n<p>Moreover, it&#8217;s crucial to consider whether your legal service vendors, including process servers like 360 Legal, use nearshore or offshore developers in their operations. The use of such developers can significantly impact the security of sensitive document delivery. As we&#8217;ve discussed in our previous article on <a href=\"https:\/\/360legal.net\/blog\/near-shore-processing-liability\/\">nearshore processing<\/a>, outsourcing to foreign countries, even nearby ones, can expose your clients&#8217; data to additional privacy risks and potentially violate compliance standards for government-backed mortgages.<\/p>\n<h3>360 Legal&#8217;s Approach to Client Information Security<\/h3>\n<p>While I can&#8217;t speak for my competitors, I can confidently tell you that 360 Legal addresses the full spectrum of information security every time we engage with a new client. No matter how you connect with 360 Legal, we ensure your information is handled securely. If use our 360 TotalView customer portal, you can be certain that all communications from your computer to our portal are encrypted and secure. Additionally, we&#8217;ve developed a secure desktop app, 360 Connect, which establishes a secure connection between the 360 Network and your network and scans for viruses and malware to prevent any malicious content from crossing between our networks. For larger firms connecting directly to our Service of Process platform, 360 Integrate can set up VPN tunnels between your network&#8217;s edge and our datacenter. Traffic inside the VPN is encrypted, ensuring a secure, private channel for data transmission between our systems.<\/p>\n<p>If your legal vendor isn&#8217;t discussing information security with you, they probably aren&#8217;t prioritizing it themselves. This oversight puts you, your data, and your clients&#8217; reputations at risk. In today&#8217;s competitive environment, can you afford to work with a vendor that isn&#8217;t secure? At 360 Legal, we are committed to keeping our clients&#8217; data and reputations impeccable.<\/p>\n<p>You, your firm, your clients, and your staff deserve better! Call Us (888) 360-5345 .<\/p>\n<\/article>\n<p>Mike Weaver<br \/>\nPresident<br \/>\n360 Legal<\/p>\n<article>Links:<a href=\"https:\/\/www.consumerfinance.gov\/compliance\/circulars\/circular-2022-04-insufficient-data-protection-or-security-for-sensitive-consumer-information\/\" target=\"_blank\" rel=\"nofollow noopener\">CFPB Consumer Financial Protection Circular 2022-04<\/a><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories?page=1\" target=\"_blank\" rel=\"nofollow noopener\">CISA Cybersecurity Alerts &amp; Advisories<\/a>\u00a0<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security isn&#8217;t just IT jargon\u2014it&#8217;s crucial for your law firm&#8217;s success. Learn how 360 Legal protects your sensitive data and why your choice of legal vendor matters more than ever in today&#8217;s cyber landscape.<\/p>\n","protected":false},"author":1,"featured_media":12203,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Legal Information Security: 360 Legal's Approach","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[19,20],"tags":[408,406,410,407,409],"series":[],"post_folder":[],"ppma_author":[487],"class_list":["post-12200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-client-code","category-legal-technology","tag-cfpb-data-protection-compliance","tag-information-security-for-law-firms","tag-law-firm-ransomware-prevention","tag-legal-services-cybersecurity","tag-secure-process-serving"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","author_meta":{"display_name":"Mike Weaver","author_link":"https:\/\/360legal.net\/blog\/author\/admin360\/"},"featured_img":"https:\/\/360legal.net\/blog\/wp-content\/uploads\/2024\/09\/360-Legal-IT-Security-300x157.jpg","coauthors":[{"link":"https:\/\/360legal.net\/blog\/author\/admin360\/","display_name":"Mike Weaver"}],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/360legal.net\/blog\/client-code\/\" class=\"advgb-post-tax-term\">Client Code<\/a>","<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">Legal Technology<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Client Code<\/span>","<span class=\"advgb-post-tax-term\">Legal Technology<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">CFPB data protection compliance<\/a>","<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">Information security for law firms<\/a>","<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">Law firm ransomware prevention<\/a>","<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">Legal services cybersecurity<\/a>","<a href=\"https:\/\/360legal.net\/blog\/legal-technology\/\" class=\"advgb-post-tax-term\">Secure process serving<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">CFPB data protection compliance<\/span>","<span class=\"advgb-post-tax-term\">Information security for law firms<\/span>","<span class=\"advgb-post-tax-term\">Law firm ransomware prevention<\/span>","<span class=\"advgb-post-tax-term\">Legal services cybersecurity<\/span>","<span class=\"advgb-post-tax-term\">Secure process serving<\/span>"]}},"comment_count":0,"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on September 18, 2024","modified":"Updated on September 18, 2024"},"absolute_dates_time":{"created":"Posted on September 18, 2024 3:45 pm","modified":"Updated on September 18, 2024 4:07 pm"},"featured_img_caption":"","series_order":null,"publishpress_future_action":{"enabled":false,"date":"2026-04-19 10:46:42","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"authors":[{"term_id":487,"user_id":1,"is_guest":0,"slug":"admin360","display_name":"Mike Weaver","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/e8742562f3af6e3b726cf397a7fe58715e2ca23761bf1eba53b1e2ddd6b5af2f?s=96&d=mm&r=g","1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/posts\/12200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/comments?post=12200"}],"version-history":[{"count":7,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/posts\/12200\/revisions"}],"predecessor-version":[{"id":12211,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/posts\/12200\/revisions\/12211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/media\/12203"}],"wp:attachment":[{"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/media?parent=12200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/categories?post=12200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/tags?post=12200"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/series?post=12200"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/post_folder?post=12200"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/360legal.net\/blog\/wp-json\/wp\/v2\/ppma_author?post=12200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}