SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
M O B I L E & P C
S E C U R I T Y
Identify	
  unprotected	
  confidential	
  client	
  
data	
  on	
  computers	
  and	
  mobile	
  devices.
The	
  estimated	
  annual	
  loss	
  of	
  revenue	
  due	
  
to	
  theft	
  of	
  intellectual	
  property	
  is	
  Over	
  
$3	
  Billion.	
  	
  
Source:	
  The	
  IP	
  Commission	
  Report	
  2013
L A W Y E R S O N - T H E - G O
Mobility	
  has	
  changed	
  the	
  landscape	
  at	
  law	
  firms	
  	
  and	
  how	
  client	
  data	
  is	
  accessed.	
  Today,	
  this	
  legal	
  data	
  
resides	
  on	
  computers,	
  smartphones	
  and	
  tablets	
  making	
  sensitive	
  case	
  information	
  readily	
  available	
  for	
  
the	
  lawyer	
  at	
  court,	
  in	
  the	
  office	
  and	
  on-­‐the-­‐go.	
  
Furthermore,	
   the	
   adoption	
   of	
   BYOD	
   and	
   cloud	
   sharing	
   technologies	
   create	
   a	
   number	
   of	
   security	
  
concerns	
   for	
   legal	
   IT	
   administrators.	
   Although	
   one	
   out	
   of	
   twenty	
   smart	
   devices	
   are	
   reported	
   lost	
   or	
  
stolen,	
   the	
   risks	
   and	
   liabilities	
   are	
   far	
   greater	
   when	
   these	
   devices	
   contain	
   unencrypted	
   data	
   such	
   as	
  
intellectual	
  property,	
  pending	
  litigation,	
  and	
  PII	
  -­‐	
   personal	
  identifiable	
  information.	
  Hackers	
  need	
  only	
  
one	
  compromised	
  device	
  or	
  file	
  to	
  wreak	
  havoc,	
  creating	
  unnecessary	
  liabilities	
  for	
  a	
  law	
  firm.	
  	
  
Now	
   the	
   good	
   news.	
   iScan	
   Online	
   recognizes	
   these	
   security	
   challenges	
   by	
   providing	
   legal	
   IT	
   the	
  
industry’s	
   first	
   mobile,	
   PC	
   and	
   BYOD	
   security	
   scanning	
   solution,	
   identifying	
   such	
   unprotected	
   data	
   at	
  
rest,	
  mitigating	
  data	
  breaches	
  from	
  a	
  potential	
  security	
  incident.	
  In	
  response	
  to	
  the	
  increasing	
  number	
  
of	
   stolen	
   and	
   lost	
   devices,	
   iScan	
   Online	
   provides	
   mobile	
   security	
   and	
   management,	
   providing	
  
administrators	
  and	
  attorneys	
  the	
  capability	
  to	
  remotely	
  scan,	
  lock,	
  locate	
  and	
  wipe	
  these	
  devices.
SCAN LOCK LOCATE WIPE
www.iscanonline.com
L E G A L S E C U R I T Y S O L U T I O N S
iScan	
  Online,	
  2013’s	
  security	
  industry	
  innovator	
  of	
  the	
  year,	
  prevents	
  your	
  firm	
  from	
  becoming	
  a	
  victim	
  
of	
  data	
  breaches	
  by	
  scanning	
  to	
  uncover	
  the	
  lurking	
  threats	
  for	
  mobile	
  and	
  computing	
  endpoints,.
THE DATA BREACH STORM
The	
   number	
   of	
   data	
   breaches	
   and	
   security	
  
incidents	
   continue	
   to	
   rise,	
   with	
   industry	
  
regulations	
   pushing	
   for	
   transparency.	
   All	
   signs	
  
are	
   pointing	
   to	
   2014	
   being	
   a	
   critical	
   year	
   for	
  
legal	
   firms	
   to	
   prevent	
   becoming	
   yet	
   another	
  
headline.	
  
Over	
   the	
   past	
   decade	
   we	
   have	
   experienced	
   an	
  
explosion	
  of	
  incidents	
  affecting	
  all	
  sizes	
  of	
  firms.	
  
The	
  end	
  of	
  last	
  year	
  showed	
  no	
  signs	
  of	
  slowing	
  
down	
  and	
  is	
  becoming	
  what	
  we	
  call	
  ‘The	
  Perfect	
  
Storm	
  of	
  Data	
  Breaches’.	
  
It’s	
   more	
   than	
   just	
   a	
   stolen	
   or	
   lost	
   device	
  
contributing	
  to	
  this	
  storm.	
  It	
  is	
  the	
  Cyber	
  Attack	
  
Threat	
   Pillars	
   that	
   need	
   to	
   be	
   identified	
   and	
  
remediated	
   in	
   order	
   to	
   safeguard	
   both	
   the	
  
employee	
  and	
  client	
  data.	
  	
  
CYBER ATTACK THREAT PILLARS
I.	
   Vulnerable	
   operating	
   systems	
   can	
   lead	
   to	
   root	
  
access	
   to	
   the	
   device	
   permitting	
   a	
   hacker	
   to	
  
compromise	
  its	
  entirety.	
  	
  
II.	
   Vulnerable	
   applications	
   that	
   are	
   not	
   updated,	
  
provide	
   backdoors,	
   most	
   notably	
   resulting	
   in	
  
data	
  leakage.	
  e.g.	
  Snapchat	
  vulnerability.	
  
III.	
   Configurations	
   are	
   improper	
   device	
   security	
  
settings	
   that	
   aid	
   in	
   the	
   cause	
   of	
   device/data	
  
access.	
   e.g.	
   Lack	
   of	
   onscreen	
   passwords,	
  
jailbroken	
   devices,	
   or	
   encryption	
   disabled	
   are	
  
the	
   p erfect	
   example,	
   especia lly	
   when	
   a	
  
misplaced	
   device	
   is	
   picked	
   up	
   and	
   accessed	
   by	
  
prying	
  eyes.	
  
IV.	
   Confidential	
   PII	
   data	
   that	
   is	
   unencrypted.	
  
Most	
   common	
   data	
   breaches	
   making	
   the	
   news	
  
are	
   tied	
   to	
   social	
   security	
   and	
   credit	
   card	
  
numbers.	
  
ISCAN RESPONDS TO THREAT PILLARS
iScan	
   Online	
   specializes	
   in	
   the	
   identification	
   of	
  
these	
   Cyber	
   Attack	
   Threat	
   Pillars,	
   exposing	
   the	
  
security	
   posture	
   and	
   data	
   at	
   risk	
   without	
   a	
  
doubt.	
  	
  
Here	
   at	
   iScan,	
   we	
   call	
   this	
   Data	
   Discovery	
   and	
  
Vulnerability	
   Scanning.	
   What’s	
   unique	
   is	
   the	
  
fact	
   that	
   we	
   can	
   do	
   this	
   without	
   requiring	
  
hardware	
   or	
   complex	
   software	
   and	
   provide	
  
healthcare	
   organizations	
   to	
   know	
   exactly	
   what	
  
data	
  is	
  at	
  risk	
  within	
  minutes.	
  
PII DISCOVERY SCAN
Scanning	
   your	
   computer	
   and	
   mobile	
   devices,	
  
immediately	
   uncovers	
   unprotected	
   data.	
   We	
  
i n c l u d e	
   p re -­‐ d e f i n e d	
   p o p u l a r	
   d a t a	
   t y p e s	
  
discovering	
   credit	
   card,	
   drivers	
   license,	
   social	
  
security	
   numbers	
   and	
   more.	
   You	
   can	
   also	
   add	
  
your	
   own	
   sensitive	
   data	
   patterns	
   such	
   as	
  
pending	
  litigation	
  information	
  and	
  trade	
  secrets.	
  
MOBILE - EYE OF THE STORM
Mobile	
   risks	
   include	
   traditional	
   vulnerabilities	
  
a n d	
   u n p ro t e c t e d	
   s e n s i t ive	
   d a t a	
   j u s t	
   a s	
  
traditional	
   computers	
   do.	
   In	
   fact,	
   smart	
   devices	
  
present	
   new	
   dangers	
   that	
   one	
   might	
   not	
   have	
  
previously	
   anticipated.	
   Avoid	
   the	
   perfect	
   storm	
  
by	
  getting	
  started	
  with	
  iScan	
  Online	
  today.	
  
How	
   important	
   is	
   it	
   for	
   you	
   to	
   know	
   what	
  
u n p r o t e c t e d	
   d a t a	
   i s	
   a t	
   r i s k	
   o n	
   yo u r	
  
computers,	
  laptops	
  and	
  mobile	
  devices?
iScan Online, Inc.!
5600 Tennyson Pkwy, #380!
Plano, TX 75024!
214-276-1150!
www.iscanonline.com
1
1. SC Magazine awards iScan Online Industry
Innovator of the Year - 2013

Más contenido relacionado

Último

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Destacado

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

iScan Online Legal Solutions Brief

  • 1. M O B I L E & P C S E C U R I T Y Identify  unprotected  confidential  client   data  on  computers  and  mobile  devices. The  estimated  annual  loss  of  revenue  due   to  theft  of  intellectual  property  is  Over   $3  Billion.     Source:  The  IP  Commission  Report  2013 L A W Y E R S O N - T H E - G O Mobility  has  changed  the  landscape  at  law  firms    and  how  client  data  is  accessed.  Today,  this  legal  data   resides  on  computers,  smartphones  and  tablets  making  sensitive  case  information  readily  available  for   the  lawyer  at  court,  in  the  office  and  on-­‐the-­‐go.   Furthermore,   the   adoption   of   BYOD   and   cloud   sharing   technologies   create   a   number   of   security   concerns   for   legal   IT   administrators.   Although   one   out   of   twenty   smart   devices   are   reported   lost   or   stolen,   the   risks   and   liabilities   are   far   greater   when   these   devices   contain   unencrypted   data   such   as   intellectual  property,  pending  litigation,  and  PII  -­‐   personal  identifiable  information.  Hackers  need  only   one  compromised  device  or  file  to  wreak  havoc,  creating  unnecessary  liabilities  for  a  law  firm.     Now   the   good   news.   iScan   Online   recognizes   these   security   challenges   by   providing   legal   IT   the   industry’s   first   mobile,   PC   and   BYOD   security   scanning   solution,   identifying   such   unprotected   data   at   rest,  mitigating  data  breaches  from  a  potential  security  incident.  In  response  to  the  increasing  number   of   stolen   and   lost   devices,   iScan   Online   provides   mobile   security   and   management,   providing   administrators  and  attorneys  the  capability  to  remotely  scan,  lock,  locate  and  wipe  these  devices. SCAN LOCK LOCATE WIPE www.iscanonline.com
  • 2. L E G A L S E C U R I T Y S O L U T I O N S iScan  Online,  2013’s  security  industry  innovator  of  the  year,  prevents  your  firm  from  becoming  a  victim   of  data  breaches  by  scanning  to  uncover  the  lurking  threats  for  mobile  and  computing  endpoints,. THE DATA BREACH STORM The   number   of   data   breaches   and   security   incidents   continue   to   rise,   with   industry   regulations   pushing   for   transparency.   All   signs   are   pointing   to   2014   being   a   critical   year   for   legal   firms   to   prevent   becoming   yet   another   headline.   Over   the   past   decade   we   have   experienced   an   explosion  of  incidents  affecting  all  sizes  of  firms.   The  end  of  last  year  showed  no  signs  of  slowing   down  and  is  becoming  what  we  call  ‘The  Perfect   Storm  of  Data  Breaches’.   It’s   more   than   just   a   stolen   or   lost   device   contributing  to  this  storm.  It  is  the  Cyber  Attack   Threat   Pillars   that   need   to   be   identified   and   remediated   in   order   to   safeguard   both   the   employee  and  client  data.     CYBER ATTACK THREAT PILLARS I.   Vulnerable   operating   systems   can   lead   to   root   access   to   the   device   permitting   a   hacker   to   compromise  its  entirety.     II.   Vulnerable   applications   that   are   not   updated,   provide   backdoors,   most   notably   resulting   in   data  leakage.  e.g.  Snapchat  vulnerability.   III.   Configurations   are   improper   device   security   settings   that   aid   in   the   cause   of   device/data   access.   e.g.   Lack   of   onscreen   passwords,   jailbroken   devices,   or   encryption   disabled   are   the   p erfect   example,   especia lly   when   a   misplaced   device   is   picked   up   and   accessed   by   prying  eyes.   IV.   Confidential   PII   data   that   is   unencrypted.   Most   common   data   breaches   making   the   news   are   tied   to   social   security   and   credit   card   numbers.   ISCAN RESPONDS TO THREAT PILLARS iScan   Online   specializes   in   the   identification   of   these   Cyber   Attack   Threat   Pillars,   exposing   the   security   posture   and   data   at   risk   without   a   doubt.     Here   at   iScan,   we   call   this   Data   Discovery   and   Vulnerability   Scanning.   What’s   unique   is   the   fact   that   we   can   do   this   without   requiring   hardware   or   complex   software   and   provide   healthcare   organizations   to   know   exactly   what   data  is  at  risk  within  minutes.   PII DISCOVERY SCAN Scanning   your   computer   and   mobile   devices,   immediately   uncovers   unprotected   data.   We   i n c l u d e   p re -­‐ d e f i n e d   p o p u l a r   d a t a   t y p e s   discovering   credit   card,   drivers   license,   social   security   numbers   and   more.   You   can   also   add   your   own   sensitive   data   patterns   such   as   pending  litigation  information  and  trade  secrets.   MOBILE - EYE OF THE STORM Mobile   risks   include   traditional   vulnerabilities   a n d   u n p ro t e c t e d   s e n s i t ive   d a t a   j u s t   a s   traditional   computers   do.   In   fact,   smart   devices   present   new   dangers   that   one   might   not   have   previously   anticipated.   Avoid   the   perfect   storm   by  getting  started  with  iScan  Online  today.   How   important   is   it   for   you   to   know   what   u n p r o t e c t e d   d a t a   i s   a t   r i s k   o n   yo u r   computers,  laptops  and  mobile  devices? iScan Online, Inc.! 5600 Tennyson Pkwy, #380! Plano, TX 75024! 214-276-1150! www.iscanonline.com 1 1. SC Magazine awards iScan Online Industry Innovator of the Year - 2013