LeastTrust IT

Client Use Cases

Cyber Insurance Viability

A IP litigation law firm lost its cyber insurance and had a claim denied due to an earlier faulty attestation (Cyber Awareness Training and MFA usage). The firm endured a Ransomware from phishing that resulted in unknown amounts of client and proprietary data leakage. The company was able to recover from backups, but some clients walked away from their long term relationship with the law firm. 

The team engaged LeastTrust to incorporate data access controls, employee provisions, compulsory training, data classification software, managed browser, file tracking, as well as table stakes insurance controls (cloud configuration management, vulnerability remediation, MFA,  and periodic penetration testing). 

With this new hardened IT (also evidenced) the insurance broker was able to attract 3 favorable quotes for the coming year. 

Investment Advisor Data Leak

A registered investment advisor (RIA) has a business of brokering hard to acquire deals (private investments for qualified buyers). The RIA was compliant with SEC guidelines, but it feared of a possible data leak within its current clients. New deals that are confidential were being leaked into the media and public. If the RIA was suspected of violating their NDA from down stream clients they would no longer receive this rare deal flow. LeastTrust was hired to implement several data tracking mechanisms that are both a deterrent yet also detective that could provide digital assurance that it client base was not the source of the recurring leaks.  This clear “chain of title” data tracking system has end to end assurance to both the RIA and its client base. 

Estate attorney advise their HNW clients

A high net worth family had recently suffered two cyber events. One was ACH fraud from a wedding catering vendor that was infiltrated by an offshore adversary.  $45,000 of funds were sent to the an account that was invoiced from that adversary claiming they had addition bank account for large payments. The loss was not recoverable.  Additionally an older family member had been scammed out of a cryptocurrency scheme.

The family wanted to uplift its cybersecurity posture. With the help of LeastTrust IT: several new controls were included in the family IT umbrella: Passkey adoption, delegation of all payments to one trained individual, use of VaultBooks for all non social or everyday activities, mandatory attendance at security training workshops (both recurring and emergency),  and an open hotline to alert or verify a questionable event. 

Training, Hardware, Policies, and Practice now keep this family and its investments safe. 

Startup Protections

An angel investor recognized a unique risk in many of the young companies that he supported and mentored. The lack of formalized IP protections (beyond patent filings) was a recurring theme in these investments. The startups did not have confidential data and “Crown Jewel” protection in place to prevent co-founders and employees from mis-appropriating proprietary data. Long term relationships and college friendships were delaying the documentation, governance, and compliance necessities. 

LeastTrust (partnering with law firms on documents) was engaged to install IP protections to provide both the non-technical and technical elements. Our team was able to integrate, document and train the business leaders how to leverage the IP mindset and build a sustainable culture. 

IP Lifecycle Diagram PDF

Crown Jewels and Trade Secret Defense