Blog Layout

What the Is a SIEM and Why Do Law Firms Need Them?

Apr 25, 2024

 Here’s Your Primer

  1. Explaining a SIEM in Simple Terms (Kind Of …)
  2. What Kind of Things Can a SIEM Do for Law Firms?
  3. What Are the Core Functions of a SIEM?
  4. What Are the Benefits of Using a SIEM for a Law Firm?
  5. How Does a Law Firm Implement a SIEM?
  6. How Much Will a SIEM Cost Your Small Law Firm?
  7. The Role a SIEM Will Play for Your Law Firm


Explaining a SIEM Briefly in Simple Terms
It isn’t easy to explain it simply, but here we go. SIEM — pronounced “sim” — is an acronym for “security information and event management.” In the simplest terms, it is a security solution that detects threat activities before your law firm is significantly impacted. SIEMs can detect, analyze and, most importantly, respond to security issues.

SIEMs harvest log data from many sources, performing the sorcerer’s trick of identifying activity that is not normal with real-time analysis. Best of all, it can take action without human involvement — the need for human involvement slows everything down. Like so much technology, SIEMS have morphed over the last few years and now they detect threats and respond to them faster and with more assurance that they are taking the correct action with the aid of artificial intelligence.

What Kind of Things Can a SIEM Do for Law Firms?
Here’s one example of what a SIEM can do quickly. It can flag a user account as suspicious when it generates 25 failed login attempts in 25 minutes but it would likely be regarded as a lower priority because the attempts were likely made by a user who forgot their login information. However, a user account that generates 130 failed login attempts in five minutes would be tagged as a high-priority event because the most likely explanation is that a brute-force attack is taking place against your law firm.

Another example is impossible travel.

After one successful login, there might be a second successful login from an IP address that would indicate an impossible travel time. For example, perhaps the second login is over 2,500 miles away and occurred five minutes after the first one. It may be that the user is utilizing a VPN, and the access is valid. It most certainly doesn’t involve the use of a Star Trek transporter to cover the distance, but rather, it may be an attacker who obtained valid user credentials.

What Are the Core Functions of a SIEM?
This is the hard part, so bear with us. SIEMs vary in their capabilities, which means you must pay attention to what any particular SIEM platform offers. However, the core functions are these:
  1. Log management. SIEMs harvest vast amounts of data in a central location, organize it, and then determine if there is data indicating a threat, an actual attack or a breach.
  2. Event correlation. This basically means the SIEM will sort the data to identify relationships and patterns, which allows it to identify security incidents across your law firm’s network, which permits fast detection and response to possible threats.
  3. Incident monitoring and response. In brief, a SIEM will monitor security incidents across a law firm network, providing alerts and audits of all activity connected to an incident.
What Are the Benefits of Using a SIEM for a Law Firm?
Law firms have an ethical duty to protect their confidential data. Law firms of all sizes must take reasonable steps to reduce cybersecurity risks and meet regulatory compliance standards.

SIEMs are the best way to strengthen a law firm’s cybersecurity, offering the following:

  • A view of potential threats.
  • Real-time threat identification and rapid response, which minimizes damage to the law firm.
  • Highly advanced threat intelligence.
  • Regulatory compliance auditing and reporting.
  • A LOT more transparency monitoring users, applications and devices.
  • In the event of a breach, it can perform a detailed forensics analysis.
How Does a Law Firm Implement a SIEM?
 Here are some of the elements involved in implementing a SIEM:

  • Define your requirements for SIEM deployment. You will likely need the assistance of your managed service provider or your in-house IT/cybersecurity employees.
  • Once you install it, do some test runs.
  • Make sure you’ve got a sufficient amount of data for testing purposes.
  • Having a SIEM is not a guarantee that you won’t have incidents or suffer a breach, so make sure you have an incident response plan — just in case!
  • As improvements become available for your SIEM, integrate them.How Much Will a SIEM Cost Your Small Law Firm?
  • Not as much as you might think. While pricing will vary for the various SIEM solutions, look for offerings that are cloud-based and priced on a per-user basis. Such solutions should cost around $10 per user per month — which is very affordable even for a solo attorney.
The Role a SIEM Will Play for Your Law Firm
Having a SIEM is an integral part of a firm’s cybersecurity. Most law firms these days have a managed IT/cybersecurity provider. A SIEM gives that provider a central place to collect and analyze volumes of data, streamlining security workflow. Additionally, it has operational capabilities such as compliance reporting, incident management, and sophisticated dashboards that prioritize threat activity.

It is endlessly frustrating to hear law firms say they choose not to install a SIEM for budgetary reasons. Though we sound like a broken record, we often tell our client firms, “If you can’t afford security, you can’t afford a breach.”

And trust us, the breach is far, far more costly.

Authors and Contributors
Sharon D. Nelson is a practicing attorney and the president of Sensei Enterprises, Inc. She is a past president of the Virginia State Bar, the Fairfax Bar Association and the Fairfax Law Foundation. She is a co-author of 18 books published by the ABA. snelson@senseient.com.

John W. Simek is vice president of Sensei Enterprises. He is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and a nationally known expert in digital forensics. He and Sharon provide legal technology, cybersecurity and digital forensics services from their Fairfax, Virginia, firm. jsimek@senseient.com.

Michael C. Maschke is the CEO/Director of Cybersecurity and Digital Forensics of Sensei Enterprises. He is an EnCase Certified Examiner and a Certified Computer Examiner. mmaschke@senseient.com.
26 Apr, 2024
In continuation of Microsoft’s series of data security incidents, employees accidentally exposed internal data to the public. The leak exposed an unprotected Azure storage server containing code, scripts, and configuration files. Microsoft has announced that it has fixed a security breach that exposed internal company credentials and files to the open internet. The breach was first discovered by security researchers from cybersecurity firm SOC Radar. According to their report, an internal error resulted in an Azure storage server without password protection being given public access. The exposed data was primarily related to Microsoft’s Bing search engine, including configuration files, code, and scripts that employees used to access a range of internal systems and databases. Consequently, bad actors could identify and access locations for Microsoft's internal data. So far, it has not been made clear how long the data has been exposed. Anuj Mudaliar Assistant Editor - Tech, SWZD opens a new window opens a new window Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
26 Apr, 2024
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. These notifications are related to the recent leak of a massive amount of AT&T customer data on the Breach hacking forums that was offered for sale for $1 million in 2021. When threat actor ShinyHunters first listed the AT&T data for sale in 2021, the company told BleepingComputer that the collection did not belong to them and that their systems had not been breached. Last month, when another threat actor known as 'MajorNelson' leaked the entire dataset on the hacking forum, AT&T once again told BleepingComputer that the data did not originate from them and their systems were not breached. After BleepingComputer confirmed that the data belonged to AT&T and DirectTV accounts, and TechCrunch reported AT&T passcodes were in the data dump, AT&T finally confirmed that the data belonged to them. While the leak contained information for more than 70 million people, AT&T is now saying that it impacted a total of 51,226,382 customers. "The [exposed] information varied by individual and account, but may have included full name, email address, mailing address, phone number, social security number, date of birth, AT&T account number and AT&T passcode," reads the notification. "To the best of our knowledge, personal financial information and call history were not included. Based on our investigation to date, the data appears to be from June 2019 or earlier." BleepingComputer contacted AT&T as to why there is such a large difference in impacted customers and was told that some of the people had multiple accounts in the dataset. "We are sending a communication to each person whose sensitive personal information was included. Some people had more than one account in the dataset, and others did not have sensitive personal information," AT&T told BleepingComputer. The company has still not disclosed how the data was stolen and why it took them almost five years to confirm that it belonged to them and to alert customers. Furthermore, the company told the Maine Attorney General's Office that they first learned of the breach on March 26, 2024, yet BleepingComputer first contacted AT&T about it on March 17th and the information was for sale first in 2021. While it is likely too late, as the data has been privately circulating for years, AT&T is offering one year of identity theft protection and credit monitoring services through Experian, with instructions enclosed in the notices. The enrollment deadline was set to August 30, 2024, but exposed people should move much faster to protect themselves. Recipients are urged to stay vigilant, monitor their accounts and credit reports for suspicious activity, and treat unsolicited communications with elevated caution. For the admitted security lapse and the massive delay in verifying the data breach claims and informing affected customers accordingly, AT&T is facing multiple class-action lawsuits in the U.S. Considering that the data was stolen in 2021, cybercriminals have had ample opportunity to exploit the dataset and launch targeted attacks against exposed AT&T customers. However, the dataset has now been leaked to the broader cybercrime community, exponentially increasing the risk for former and current AT&T customers. Update 4/10/24: Added statement from AT&T about discrepancy in numbers. BILL TOULAS Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.
26 Apr, 2024
Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party SaaS vendor inadvertently exposing a subset of employee data. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. A Home Depot software vendor suffered a data breach leading to the compromise of an undisclosed number of employees. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party software vendor inadvertently exposing a subset of employee data. Reportedly, the breach was caused by a misconfigured software-as-a-service (SaaS) application.
More Posts
Share by: