{"id":843,"date":"2017-11-05T14:00:00","date_gmt":"2017-11-05T13:00:00","guid":{"rendered":"https:\/\/hub.findingsimple.com\/au\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\/"},"modified":"2020-06-03T08:34:26","modified_gmt":"2020-06-03T08:34:26","slug":"client-data-secure-as-the-weakest-link-whitepaper","status":"publish","type":"insight_resource","link":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper","title":{"rendered":"Client Data: Secure as the Weakest Link [Whitepaper]"},"content":{"rendered":"<p class=\"intro-paragraph\">In this whitepaper, published by Thomson Reuters\u2019 <a href=\"http:\/\/legalexecutiveinstitute.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Legal Executive Institute<\/em><\/a>, authors Daniel Garrie and Rhea Siers examine some of the vulnerabilities that law firms face in keeping their own internal data and client data safe from cybersecurity attacks.<\/p>\n<p>\u201cLaw firm culture has long focused on the ability of lawyers to bring a high level of thought and analysis to every legal case on the firm\u2019s roster. However, similar care has not been spent by firms when it comes to data security. Without data security, client files may inadvertently end up on a file server in China, Brazil or perhaps even Russia,\u201d the authors write.<\/p>\n<p>The authors also offer several cost-efficient solutions to help law firms and companies remedy this growing and potentially disastrous problem.<\/p>\n<p>Download your copy now to learn about cost-efficient solutions to tackle this growing and potentially disastrous problem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this whitepaper, published by Thomson Reuters\u2019 Legal Executive Institute, authors Daniel Garrie and Rhea Siers examine some of the vulnerabilities that law firms face in keeping their own internal&hellip;<\/p>\n","protected":false},"author":152,"featured_media":844,"template":"","categories":[644,602],"tags":[171,177,178,450],"resource_type":[638],"insight_job_role":[598,614,627,628],"insight_practice_area":[579],"class_list":["entry","author-legalexecutiveinstitute1","post-843","insight_resource","type-insight_resource","status-publish","has-post-thumbnail","category-data-security","category-innovation-and-technology","tag-cybersecurity","tag-data-breaches","tag-data-encryption","tag-public-wi-fi","resource_type-whitepaper","insight_job_role-in-house-lawyer","insight_job_role-partner","insight_job_role-senior-executive","insight_job_role-solicitor","insight_practice_area-commercial-law","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight<\/title>\n<meta name=\"description\" content=\"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight\" \/>\n<meta property=\"og:description\" content=\"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\" \/>\n<meta property=\"og:site_name\" content=\"TR - Legal Insight Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-03T08:34:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\",\"name\":\"Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg\",\"datePublished\":\"2017-11-05T13:00:00+00:00\",\"dateModified\":\"2020-06-03T08:34:26+00:00\",\"description\":\"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg\",\"contentUrl\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Client Data: Secure as the Weakest Link (Whitepaper)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Client Data: Secure as the Weakest Link [Whitepaper]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\",\"name\":\"TR - Legal Insight Australia\",\"description\":\"Just another Legal Hub site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight","description":"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper","og_locale":"en_US","og_type":"article","og_title":"Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight","og_description":"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.","og_url":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper","og_site_name":"TR - Legal Insight Australia","article_modified_time":"2020-06-03T08:34:26+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper","name":"Client Data: Secure as the Weakest Link | Whitepaper | Legal Insight","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage"},"image":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage"},"thumbnailUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg","datePublished":"2017-11-05T13:00:00+00:00","dateModified":"2020-06-03T08:34:26+00:00","description":"Daniel Garrie and Rhea Siers examine the vulnerabilities that law firms face in keeping their internal data and client data safe from cybersecurity attacks.","breadcrumb":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#primaryimage","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg","contentUrl":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-content\/uploads\/sites\/8\/2019\/06\/client-data-secure-weakest-link-whitepaper_image-scaled.jpg","width":2560,"height":1707,"caption":"Client Data: Secure as the Weakest Link (Whitepaper)"},{"@type":"BreadcrumbList","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/client-data-secure-as-the-weakest-link-whitepaper#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/resources"},{"@type":"ListItem","position":3,"name":"Client Data: Secure as the Weakest Link [Whitepaper]"}]},{"@type":"WebSite","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/","name":"TR - Legal Insight Australia","description":"Just another Legal Hub site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"}]}},"_links":{"self":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource\/843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource"}],"about":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/types\/insight_resource"}],"author":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/users\/152"}],"version-history":[{"count":0,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_resource\/843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media\/844"}],"wp:attachment":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media?parent=843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/categories?post=843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/tags?post=843"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/resource_type?post=843"},{"taxonomy":"insight_job_role","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_job_role?post=843"},{"taxonomy":"insight_practice_area","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_practice_area?post=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}