Security in the provision of legal advice is becoming increasingly important. It’s a service during which confidential and sensitive information is handled. Lawyers and legal advisors often gain access to private documents, personal data, business strategies and vital details of court cases, all of which must be protected from unauthorised access. Any leak of this information could compromise your company’s legal position, damaging its reputation and generating financial losses. Security fosters and enhances customer relations. We all want to feel sure that our personal information and data are properly protected against all kinds of cyberattacks.
The world is becoming more and more digitised, and this evolution poses challenges that we face on an everyday basis, although many of them go unnoticed during our lives. As online platforms and digital tools are used to store and share information more often, the risks of cyberattacks increase, putting customer confidentiality at risk. The perpetrators of these attacks learn as quickly as we do.
This cyberattack-related innovation is countered by the constant development of tools to defend the interests of individuals and companies. Below we tell you about one of them, Latch.
TU Latch’s four-eyes check
Before explaining the four-eyes check system, it’s necessary to explain what the TU Latch app consists of. It’s an authorisation control platform that provides an extra layer of security for users by operating with authorisation controls. These controls perform the function of preventing anyone who doesn’t have the password from accessing what they’re protecting (usually digital accounts or profiles). These authorisation controls are known as latches and they’re responsible for adding an extra layer of security to our digital lives.
What’s the origin of the four-eyes check?
It was a Latch customer who requested the implementation of an additional verification system to improve the security of its corporate environment. In companies that handle sensitive information, especially those with multiple administrators, the protection of accounts requiring login credentials is particularly important. The more administrative accounts that exist within a system, the higher the risk of the latter being hacked, as cybercriminals can locate more entry points. It’s therefore crucial to take additional measures to minimise these risks and ensure that the administrators don’t exert full control without adequate supervision.
Subscribe to our newsletter!
Find out about our offers and news before anyone else
What does the four-eyes check consist of?
To address this problem, a four and/or six-eyes check system was designed, using cross latches managed by other employees within the organisation. This model not only needs the authorisation of the “primary” user to execute an action, but it also requires the validation of other designated users. In other words, an additional layer of control is implemented by means of the participation of several users, thus ensuring that no critical action is taken without joint consensus. This approach increases security and increases control over administrative accesses.
If a cybercriminal gains access to an administrator or external user account with a cross latch, the system allows the other users to rapidly detect the unauthorised action. If any of the latches are suspiciously opened or an attempt is made to execute an action without the consent of all the parties, the other users can reject it, detect the attack and act to mitigate the risks. This system reinforces security and facilitates the early detection of malicious behaviour, helping to prevent potential security breaches before they can cause any significant damage.
What are the benefits of the four-eyes check?
In addition to improved security and the detection of cyberattacks, Latch’s four-eyes check system delivers additional benefits in contexts involving legal and business consultancy. In these cases, control over decisions is key, particularly when it comes to handling sensitive customer data or taking actions that could have legal or financial consequences. The implementation of cross latches ensures that important decisions are approved by multiple parties, not only reducing the risk of any errors, but also providing information on the people who authorise each of the actions. This helps companies to comply with privacy and data security regulations and ensure that the process is transparent and auditable.
Moreover, this verification approach is particularly useful in corporate and legal consultancies, in which monitoring of the administrators’ actions is essential. With the four-eyes system, advisors can provide an additional layer of security for their customers and ensure that no critical action is taken without proper validation. The above reinforces the customer’s trust in the integrity of the decisions made and minimises the risks associated with the management of confidential information. In highly sensitive situations, such as the signing of contracts or the amendment of legal terms, multi-user verification provides an additional layer of control that can prove vital for protecting customers.
Graduada en el Doble Grado de Ingeniería en Diseño Industrial y Desarrollo de Producto + Ingeniería Mecánica. Soy una persona muy organizada, pero con una mente muy creativa. Trabajo en el equipo de Product Marketing CDO en Telefónica Innovación Digital aprendiendo todo lo que puedo.