This is the property of the Daily Journal Corporation and fully protected by copyright. It is made available only to Daily Journal subscribers for personal or collaborative purposes and may not be distributed, reproduced, modified, stored or transferred without written permission. Please click "Reprint" to order presentation-ready copies to distribute to clients or use in commercial marketing materials or for permission to post on a website. and copyright (showing year of publication) at the bottom.
Subscribe to the Daily Journal for access to Daily Appellate Reports, Verdicts, Judicial Profiles and more...

Ethics/Professional Responsibility,
Data Privacy

Aug. 12, 2025

Think like a hacker; plan like a lawyer

Small law firms and solo practitioners face growing cybersecurity threats, making it essential to implement practical, cost-effective incident response strategies to protect sensitive data, maintain client trust, and fulfill legal and ethical obligations.

Daniel B. Garrie

Neutral
JAMS

Cyber Security

Orange County

Cell: (212) 826-5351

Email: daniel@lawandforensics.com

See more...

Moshe Jacobius

Mediator, Arbitrator and Special Master
JAMS

Hon. Moshe Jacobius (Ret.) was a Cook County, Illinois Circuit Judge from 1991 to 2022. During his tenure, Judge Jacobius was highly regarded as a jurist and served as Presiding Judge of the Domestic Relations Division and the Chancery Division. The Illinois Jewish Judges Association has named a yearly Humanitarian Award in Judge Jacobius' name. He currently serves as a Mediator, Arbitrator and Special Master with JAMS.

See more...

Think like a hacker; plan like a lawyer
Shutterstock

Cybersecurity is a critical concern for all businesses, including small law firms and solo practitioners. While larger firms often have the resources to implement robust cybersecurity measures, smaller firms must navigate these waters with more limited means.

However, being a small firm does not mean being immune from data breaches. According to the American Bar Association's 2022 Legal Technology Survey Report, 27% of law firms reported having experienced a security breach. This article outlines best practices for incident response planning tailored specifically for legal professionals in small firms, emphasizing practical steps and cost-effective measures. Small law firms are an attractive target for cybersecurity breaches and data theft because much of their information is concentrated and attackers do not need to sift through voluminous information.

Incident response planning is a proactive approach to managing and mitigating the effects of cybersecurity incidents, such as data breaches, ransomware attacks and other cyber threats. For small law firms, the stakes are high: a single cyber incident can lead to significant financial loss, reputational damage and legal liabilities. Therefore, practitioners' approach to cybersecurity and incident response should be robust as it is essential for safeguarding your practice and clients' trust.

Best practices for incident response planning

Conduct a risk assessment

Begin by identifying potential cyber threats and vulnerabilities specific to your practice. Consider the types of data you handle, such as client information, case files and financial records. Evaluate the likelihood of various threats, including phishing attacks, malware and unauthorized access. You should also be aware of state or federal privacy law requirements that may be applicable to a data security breach as well as reporting requirements. You must also consider the interplay of professional responsibility requirements when a security breach occurs to a law firm.

For example, if your risk assessment identifies that a significant portion of your employees frequently work remotely and access sensitive data from personal devices, you may determine that the risk of a data breach due to a lost or stolen device is high. In this case, implementing strong encryption and remote data wipe capabilities for mobile devices should be a top priority.

A thorough risk assessment helps prioritize resources and focus on the most critical areas. It should be conducted regularly, at least annually or whenever significant changes occur in your firm's operations or technology environment. Consider hiring a company that employs "white hat hackers" to identify security weaknesses or untrustworthy employees.

Develop a comprehensive incident response plan

Your incident response plan (IRP) should be a detailed, written document outlining the steps to take in the event of a cyber incident. Key components include:

1. Incident identification: Define what constitutes an incident and how it will be detected. Establish protocols for monitoring systems and reporting suspicious activities. For example, if an employee notices unusual network activity or receives a suspicious email, they should know how to report it and who to report it to.

2. Response team: Identify individuals responsible for executing the IRP. Even in a small firm, designate roles such as an incident response coordinator, legal advisor and IT support (which could be an external consultant). Clearly define each team member's responsibilities to avoid confusion during an incident.

3. Communication plan: Outline how you will communicate with clients, employees and external parties during an incident. Transparency is crucial to maintaining trust. For instance, if a data breach occurs, you may need to notify affected clients promptly and provide updates on the situation and steps being taken to mitigate the impact.

4. Containment and eradication: Detail steps to contain the breach and prevent further damage. This may involve disconnecting affected systems, applying patches or restoring from backups. Consider a scenario where ransomware has encrypted critical case files; your IRP should outline the steps to isolate the infected systems and recover data from backups.

5. Recovery: After containing a breach, you'll need a clear plan to resume business operations securely and verify that all systems are clean and functioning correctly.

6. Post-incident review: Conduct a thorough review of the incident to identify lessons learned and improve future response efforts. This review should analyze what went well, what could have been handled better, and what changes need to be made to the IRP to better prepare for future incidents.

Implement strong access controls

Control who has access to sensitive information. Use strong, unique passwords and enforce multi-factor authentication (MFA) wherever possible. Limit access to data based on roles and responsibilities, ensuring that employees only have access to the information they need to perform their duties. For example, a paralegal working on a specific case should only have access to files related to that case, not the entire client database.

Conduct employee training and awareness programs

Human error is a significant factor in many cybersecurity incidents. Regularly train employees in recognizing phishing attempts, safe browsing practices and the importance of safeguarding sensitive information. Promote a culture of cybersecurity awareness within your firm. It may be helpful to provide employees with a manifesto.

Encourage clients to cooperate in maintaining information secure and confidential

The attorney can encourage clients to be cognizant and vigilant in maintaining privacy. This can be communicated to the client through e-mails or even through engagement agreements. The client can be encouraged to maintain multi-step authentication, not share passwords and keep track of portable devices.  

Utilize encryption and secure communication channels

Encrypt sensitive data both at rest and in transit. Use secure communication channels, such as encrypted email services, for exchanging confidential information with clients and colleagues. Use SSL/TLS whenever possible and connect to the Internet using a Virtual Private Network (VPN). Encryption helps protect data even if it is intercepted or accessed by unauthorized individuals.

Backup critical data

Regularly back up your data to an off-site or cloud-based storage solution. Ensure that backups are encrypted and that you can restore data quickly in the event of an incident. Test your backup and recovery processes periodically to verify their effectiveness. In the event of a ransomware attack that encrypts your firm's data, having a recent, secure backup could mean the difference between paying a ransom or restoring your data from the backup.

Engage with cybersecurity professionals

Small firms may lack in-house IT expertise, making it beneficial to engage with external cybersecurity professionals. These experts can assist with risk assessments, IRP development and incident response. Consider establishing a relationship with a reputable cybersecurity firm or consultant who can provide ongoing support. You might consider consulting with an expert to prevent Advanced Persistent Threats (APT's). This is a sophisticated cybersecurity attack where an adversary gains unauthorized access to a network and remains undetected for an extended period of time. There are ways to prevent and combat such attacks, but they require specialized, expert knowledge and monitoring.

Review legal and regulatory requirements

Ensure your IRP complies with relevant legal and regulatory requirements. This may include data protection laws, industry standards and ethical obligations specific to the legal profession. Staying informed about these requirements helps avoid potential legal repercussions and ensures your response efforts are legally sound.

Test and update your incident response plan regularly

An IRP is not a one-time project but an ongoing process. Regularly test your plan through simulations and tabletop exercises. Update the plan as needed based on changes in your practice, emerging threats, and lessons learned from incidents and tests. Conducting regular tests can help identify gaps or weaknesses in your plan before an actual incident occurs.

Conclusion

Incident response planning is a critical component of cybersecurity for small law firms and solo practitioners. By following these best practices, legal professionals can better protect their practices from cyber threats, maintain client trust and ensure continuity of operations.

Disclaimer: The content is intended for general informational purposes only and should not be construed as legal advice. If you require legal or professional advice, please contact an attorney.  

#387068


Submit your own column for publication to Diana Bosetti


For reprint rights or to order a copy of your photo:

Email Jeremy_Ellis@dailyjournal.com for prices.
Direct dial: 213-229-5424

Send a letter to the editor:

Email: letters@dailyjournal.com