Security: Network & Desktop

Man pointing at network graphic

There is no one size fits all when it comes to security, though we can all agree that it belongs at the top of the priority list. We work with companies in Healthcare, Legal, DOD, Finance, Manufacturing, Marketing and other types of business. Our top tier partners specialize in all aspects of security, from basic network and desktop security to more advanced event log management solutions such as SIEM (Security Information and Event Management), SOCaaS (Security Operations Center as a Service), and PAM (Privileged Access Management). New security services companies are popping up left and right — let us find the right, reputable fit for you.

CMMC Compliance- We can help-Call 757.704.7100 for assistance.

Federal Contractors: Do you need help with a security assessment as part of your federal contract? We assist with security assessments to meet NIST/CMMC network contracting requirements. Does your firm need to ramp up network security and meet Federal contract guidelines, give our team a call to help.

Security Services offered: Firewall/Hardware implementation, Managed End Point, security assessments, penetration testing, vulnerability scan, employee security training, remediation, project based work and many other security services.

Risk To Firm if Security is Ignored

  • Downtime-number of employees X number of hours or days system down.
  • Contract Risk-Government contracts contain network security requirements, contractors risk losing contracts if not adhered to.
  • Reputational Risk-Company brand and goodwill can be harmed with a security breach. Customer, employee and financial data can be compromised.
  • Ransomware-the effects of this type of attack can last hours, days or weeks. Large sums of money are spent in hopes to get system access and data back.
  • Notice to Customers-ABA requires lawyers to notify all clients if they are not able to access client records which happens during Ransomware and company files are locked out.*
  • Remote Access Workers-Employees working remotely can open up vulnerabilities in access to company files, infect the network by uploading corrupt files and phishing attempts are some of the ways hackers attempt to infiltrate your companies network.

*-Further, when a data breach occurs involving, or having a substantial likelihood of involving, material client information, lawyers have a duty to notify clients of the breach and to take other reasonable steps consistent with their obligations under these Model Rules.” ABA Standing Committee on Ethics and Professional Responsibility Formal Opinion 483 “Lawyers’ Obligations After an Electronic Data Breach or Cyberattack” (October 17, 2018). Formal Opinion 483 makes clear that “the potential for an ethical violation occurs when a lawyer does not undertake reasonable efforts to avoid data loss or to detect cyber-intrusion, and that lack of reasonable effort is the cause of the breach.”
https://www.americanbar.org/groups/law_practice/publications/techreport/abatechreport2019/cybersecurity2019/