New Wiper Malware Highlights Threat to Law Firms and Consultancies

DLA Piper's breach by the Petya malware should be a wake-up call to companies that deal with sensitive information. Among large corporations, some protection is common – but is it enough, and how can smaller businesses manage this threat?

Last week, DC-based law firm DLA Piper was hit and disabled by the Petya malware, taking their email and other systems offline from 27 June to 3 July. While the firm had good controls in place allowing early detection and containment of the problem, leading them to assess that client data was not breached, this should be a wakeup call for DLA Piper’s peers.

Companies dealing with sensitive industrial information – like consultancies and law firms – have been targets of industrial and state-level espionage for decades. These firms tend to be smaller, and more data-driven than most companies. And in many cases, they don’t have the sorts of policies in place that helped DLA Piper avoid catastrophe. They also tend not to bounce back from serious attacks: according to the The Ponemon Institute, the average cost for a small firm to recover from a major attack is $690,000. Many small businesses close their doors within 6 months of a major incident.

Governments and industry should work together to improve the cyber resilience of small businesses. Whether it’s a leading law firm that manages the intellectual property of key economic drivers, or the small-town manufacturer that may grow into an international business with time, every company is a data driven company with key assets that are vulnerable online.

Large companies can dedicate resources to participate in information sharing regimes and maintain relationships with government and industry cybersecurity communities. But smaller companies have less availability for formal arrangements, and instead are often going it alone, with guidance from government and industry groups. In the US, the Small Business Administration and National Institute of Science and Technology (NIST) have developed some resources to help, but these are limited. In other countries, resources are even harder to come by. Industry should work with governments to help coordinate policies that drive cybersecurity across the economy, support small and medium enterprises, and build collaborative security practices that can be easily integrated to small firms’ IT policies.

Related Articles

Access Alert: Enhancing Efficiency in India’s Logistics Through AI and Digital Integration

Access Alert: Enhancing Efficiency in India’s Logistics Through AI and Digital Integration

A recent panel discussion at the Bengaluru Tech Summit 2024 on 20 November 2024 focused on the transformative role of...

29 Nov 2024 Opinion
Access Alert: How Will Deepfake Regulations in APAC Impact Your Business?

Access Alert: How Will Deepfake Regulations in APAC Impact Your Business?

The rise of deepfakes – AI-generated content that manipulates audio, video, or images to create realistic but false representations –...

29 Nov 2024 Opinion
Access Alert: UK Government Announces £3.5M Funding Opportunity for Satellite Connectivity Projects

Access Alert: UK Government Announces £3.5M Funding Opportunity for Satellite Connectivity Projects

Introduction The UK Space Agency (UKSA) has launched a funding call of up to £3.5 million aimed at advancing satellite...

28 Nov 2024 Opinion
Access Alert: What the abolition of Mexico’s telecoms and competition regulators means and what to do next

Access Alert: What the abolition of Mexico’s telecoms and competition regulators means and what to do next

Mexico’s Congress has approved the constitutional reform for the elimination of the Federal Institute of Telecommunications (IFT) and the Federal...

25 Nov 2024 Opinion