In a closed-loop system, those risk points are greatly reduced. Data can be uploaded to one secure platform, where it’s protected by bank-level encryption when in motion and at rest. Once uploaded, access to the information can be secured and controlled, allowing you to make sure that sensitive data is only available to those who need it. Such systems can even allow you to produce information to other parties through a secure download link, rather than, say, a CD-ROM sent in the mail.
For firms looking to shore up their cybersecurity, making sure that you secure your discovery process is essential. The reality is that hackers are already targeting discovery repositories, according to Lael Andara, litigation partner at Ropers Majeski. “We just haven't necessarily identified the hacks.”