It’s never been easier to start a solo law firm, but what about your security?
One day we had a close call with a client.
It scared the crap out of me as I realized just how close our biggest client, a leading South Texas law firm, with a strong reputation as civil litigators, had been to experiencing a data breach.
We always told ourselves security was a top priority – but this day we realized we had to do more.
It all started in 2006, when I started helping lawyers with their Apple technology. It stuck and I’ve been doing it ever since.
Over the years I became keenly aware many took a lackadaisical approach to security. At the time I was only working with Mac users, and there was a general notion that Macs were safe and didn’t need security measures. Heck, I’d be lying if I didn’t believe the same when I started in 2006.
For the past 14 years, my company, GlobalMac IT, has specialized in providing complete end-to-end IT services to law firms using Apple computers. As part of our Managed Service offering, we are in charge of their security.
However, that close call with our client was a splash of cold water in my face. We had to accept that we were not doing enough and had to do more to address the evolving cyber threats and I drastically changed our approach to security.
I found most solos were simply too busy to learn deeply enough about the threats posed to them. They often believed they were too small to be a target, or that using secure passwords and 2 Factor Authentication was enough to meet their security needs.
Meet Our Team:
Tom Lambotte - CEO and Founder
Tom Lambotte is a father of four awesome children and a loving husband to his wife of 11 years.
He is also the CEO and Founder of Security+, an all-in-one security solution for solo and small firm lawyers.
Tom provides leadership, direction, and insight to help law firms better protect themselves from the dangers of cyberattacks.
Tom’s goal with Security+ is to improve the security of law firms by providing guidance, advice, and the tools that will help them protect what they have worked so hard for.
His methods are based on over a decade of research, testing, and real-world refinement of best practices.
Tom is the author of Hassle Free Mac IT Support for Law Firms and Legal Boost: Big Profits Through an IT Transformation and a third book published by the ABA Law Practice Division titled Macs in Law.
He is a highly sought after speaker at national events such as the ABA Techshow and MacTrack Legal.
Jeremey Kenney - Operations Director
Recently promoted to Operation Director, Jeremey oversees all facits of Security+ operations and focuses on the client experience, identifying opportunities for improvement and implementing those changes. Before Jeremy came onboard, he was a support engineer for Futuri Media, and before Futuri he spent 5 years working for Apple as an AppleCare Senior Advisor. This expertise made Jeremy a perfect fit for the team.
Aside from a love for videogames, Jeremy has a passion for technology in general, and loves his Thursday night golf games. He has to be the first in the group to have the newest products and often can’t help pulling computers apart to replace or upgrade hardware. He can also put them back together again, which helps.
Jeremy values spending time with friends and family, actively making the effort to connect with the important people in his life. When he is home he has two beautiful cats that won’t leave him alone, even if there’s work to do.
Jeremy’s favorite quote: “Most impossible goals can be met simply by breaking them down into bite size chunks, writing them down, believing them and going full speed ahead as if they were routine.” – Don Lancaster
Tobias Morrison - Technology Allignment Manager
As the technology alignment manager, Tobias gives clients the best experiences by ensuring the Security+ standards library is maintained with the best solutions. He gets this done by evaluating hardware, software in order to identify the best solutions for our clients. He is basically a magician who makes everything work better for clients.
Tobias’ family life is as energetic as the amount of energy he puts into work, and he is on the cusp of running a small backyard farm at his house. In total, his yard and house are home to 2 cats, 9 chickens, 2 ducks, and a rabbit. He is an avid birder, enjoying the sight of more than just his own chickens and ducks.
Tobias is also a father of 4 kids, who, of course, help with maintaining their small chicken population. When he isn’t working or with family, he is making noise as a talented vocalist, bassist, and percussionist.
Tobias’ favorite quote: “The truth is not always beautiful, nor beautiful words the truth.” – Lao Tzu
Christine Rivett - Strategic Assistant
Christine is one of the newer additions to the team, and bringing with her a wealth of knowledge to the position as the strategic assistant for the CEO and supporting Security+ clients. Following our Core Values, Christine is always looking to provide any and all support to her coworkers and managers and Security+ clients.
Christine previously spent 22 years working for Lawrence Diversfield Inc. as the office manager as well as the marketing and research functions for the company. Her career experience proves that she knows how to get people moving and working in the right direction.
Passing the best test of character, Christine, like many of her colleagues, is a dog lover. Her two German shepherds, along with her husband of 20+ years, make a great family that she gets to enjoy when she isn’t working. Regularly getting out into nature with her dogs and husband, Christine enjoys gardening, birdwatching, kayaking, camping, travelling and a lot more. Christine is the epitome of “work hard play hard.”
Christine’s favorite quote: “Never stop learning; for when we stop learning, we stop growing.” -Loyal “Jack” Lewman
Our Core Values
Be the Hero
The only comprehensive, risk-based cybersecurity protection program built for solo and small law firms.
If you’re a solo or small firm lawyer with a growing practice, then chances are you’ve already got big dreams (and an even bigger to-do list)…
You want to take on more clients, better cases, and surround yourself with a competent team so you can spend what little time you have with your loved ones.
But one security breach can completely ruin any plans you might have if you’re not careful.
Protect yourself from cybercriminals – regardless of what you have (or have not) done up until now, to reduce your risk of a data breach.
The Real-World Threats Posed to Solo Lawyers by the Dark Web and What to do About It
What Sets Security+ Apart for the Average Lawyer?
The findings above represent the average lawyer and focused on the results for solo and small firms (2-9 lawyers). The progress has been trending in the right direction, but the pace is glacial given the ethical and legal issues along with the heightened threat environment.
As you can see – the average is piss-poor and there remains room for improvement. Security+ addresses the majority of these weak areas in the overall security approach of most lawyers.
Just as a cyber insurance policy will not prevent a hack, neither will a course, attending a webinar or reading a good blog post on the topic of security. Ultimately, professionals in firms of all sizes need to synthesize good cybersecurity practices into the everyday practice of law.
Security+, is your comprehensive, risk-based security program that serves as the answer to that challenge for solo and small law firms.
Multiple Threats Require
Multiple Layers of Security
Think about the many layers of security people use to protect their homes. They put up fences, door locks, alarm systems, canine security and lock up their most valuable possessions. If all of those fail, they can always fall back on insurance to replace what’s been lost.
That’s layered security—and the same approach is needed to secure your law practice.
There is no “silver bullet” that can protect against such a wide range of threats. You need to move beyond simple antivirus and implement a solution that brings together multiple security tools. The key is in the redundancy designed in this approach: If one security control fails or is bypassed, the other overlapping defenses should be there to mitigate the threat.