Ethics/Professional Responsibility,
Data Privacy
Aug. 12, 2025
Think like a hacker; plan like a lawyer
Small law firms and solo practitioners face growing cybersecurity threats, making it essential to implement practical, cost-effective incident response strategies to protect sensitive data, maintain client trust, and fulfill legal and ethical obligations.





Daniel B. Garrie
Neutral
JAMS
Cyber Security
Orange County
Cell: (212) 826-5351
Email: daniel@lawandforensics.com

Moshe Jacobius
Mediator, Arbitrator and Special Master
JAMS
Hon. Moshe Jacobius (Ret.) was a Cook County, Illinois Circuit Judge from 1991 to 2022. During his tenure, Judge Jacobius was highly regarded as a jurist and served as Presiding Judge of the Domestic Relations Division and the Chancery Division. The Illinois Jewish Judges Association has named a yearly Humanitarian Award in Judge Jacobius' name. He currently serves as a Mediator, Arbitrator and Special Master with JAMS.

Cybersecurity is a critical concern for all businesses, including small law firms and solo practitioners. While larger firms often have the resources to implement robust cybersecurity measures, smaller firms must navigate these waters with more limited means.
However, being a small firm does not mean being immune from data breaches. According to the American Bar Association's 2022 Legal Technology Survey Report, 27% of law firms reported having experienced a security breach. This article outlines best practices for incident response planning tailored specifically for legal professionals in small firms, emphasizing practical steps and cost-effective measures. Small law firms are an attractive target for cybersecurity breaches and data theft because much of their information is concentrated and attackers do not need to sift through voluminous information.
Incident response planning is a proactive approach to managing and mitigating the effects of cybersecurity incidents, such as data breaches, ransomware attacks and other cyber threats. For small law firms, the stakes are high: a single cyber incident can lead to significant financial loss, reputational damage and legal liabilities. Therefore, practitioners' approach to cybersecurity and incident response should be robust as it is essential for safeguarding your practice and clients' trust.
Best practices for incident response planning
Conduct a risk assessment
Begin by identifying potential cyber threats and vulnerabilities specific to your practice. Consider the types of data you handle, such as client information, case files and financial records. Evaluate the likelihood of various threats, including phishing attacks, malware and unauthorized access. You should also be aware of state or federal privacy law requirements that may be applicable to a data security breach as well as reporting requirements. You must also consider the interplay of professional responsibility requirements when a security breach occurs to a law firm.
For example, if your risk assessment identifies that a significant portion of your employees frequently work remotely and access sensitive data from personal devices, you may determine that the risk of a data breach due to a lost or stolen device is high. In this case, implementing strong encryption and remote data wipe capabilities for mobile devices should be a top priority.
A thorough risk assessment helps prioritize resources and focus on the most critical areas. It should be conducted regularly, at least annually or whenever significant changes occur in your firm's operations or technology environment. Consider hiring a company that employs "white hat hackers" to identify security weaknesses or untrustworthy employees.
Develop a comprehensive incident response plan
Your incident response plan (IRP) should be a detailed, written document outlining the steps to take in the event of a cyber incident. Key components include:
1. Incident identification: Define what constitutes an incident and how it will be detected. Establish protocols for monitoring systems and reporting suspicious activities. For example, if an employee notices unusual network activity or receives a suspicious email, they should know how to report it and who to report it to.
2. Response team: Identify individuals responsible for executing the IRP. Even in a small firm, designate roles such as an incident response coordinator, legal advisor and IT support (which could be an external consultant). Clearly define each team member's responsibilities to avoid confusion during an incident.
3. Communication plan: Outline how you will communicate with clients, employees and external parties during an incident. Transparency is crucial to maintaining trust. For instance, if a data breach occurs, you may need to notify affected clients promptly and provide updates on the situation and steps being taken to mitigate the impact.
4. Containment and eradication: Detail steps to contain the breach and prevent further damage. This may involve disconnecting affected systems, applying patches or restoring from backups. Consider a scenario where ransomware has encrypted critical case files; your IRP should outline the steps to isolate the infected systems and recover data from backups.
5. Recovery: After containing a breach, you'll need a clear plan to resume business operations securely and verify that all systems are clean and functioning correctly.
6. Post-incident review: Conduct a thorough review of the incident to identify lessons learned and improve future response efforts. This review should analyze what went well, what could have been handled better, and what changes need to be made to the IRP to better prepare for future incidents.
Implement strong access controls
Control who has access to sensitive information. Use strong, unique passwords and enforce multi-factor authentication (MFA) wherever possible. Limit access to data based on roles and responsibilities, ensuring that employees only have access to the information they need to perform their duties. For example, a paralegal working on a specific case should only have access to files related to that case, not the entire client database.
Conduct employee training and awareness programs
Human error is a significant factor in many cybersecurity incidents. Regularly train employees in recognizing phishing attempts, safe browsing practices and the importance of safeguarding sensitive information. Promote a culture of cybersecurity awareness within your firm. It may be helpful to provide employees with a manifesto.
Encourage clients to cooperate in maintaining information secure
and confidential
The attorney can encourage clients to be cognizant and vigilant in maintaining privacy. This can be communicated to the client through e-mails or even through engagement agreements. The client can be encouraged to maintain multi-step authentication, not share passwords and keep track of portable devices.
Utilize encryption and secure communication channels
Encrypt sensitive data both at rest and in transit. Use secure communication channels, such as encrypted email services, for exchanging confidential information with clients and colleagues. Use SSL/TLS whenever possible and connect to the Internet using a Virtual Private Network (VPN). Encryption helps protect data even if it is intercepted or accessed by unauthorized individuals.
Backup critical data
Regularly back up your data to an off-site or cloud-based storage solution. Ensure that backups are encrypted and that you can restore data quickly in the event of an incident. Test your backup and recovery processes periodically to verify their effectiveness. In the event of a ransomware attack that encrypts your firm's data, having a recent, secure backup could mean the difference between paying a ransom or restoring your data from the backup.
Engage with cybersecurity professionals
Small firms may lack in-house IT expertise, making it beneficial to engage with external cybersecurity professionals. These experts can assist with risk assessments, IRP development and incident response. Consider establishing a relationship with a reputable cybersecurity firm or consultant who can provide ongoing support. You might consider consulting with an expert to prevent Advanced Persistent Threats (APT's). This is a sophisticated cybersecurity attack where an adversary gains unauthorized access to a network and remains undetected for an extended period of time. There are ways to prevent and combat such attacks, but they require specialized, expert knowledge and monitoring.
Review legal and regulatory requirements
Ensure your IRP complies with relevant legal and regulatory requirements. This may include data protection laws, industry standards and ethical obligations specific to the legal profession. Staying informed about these requirements helps avoid potential legal repercussions and ensures your response efforts are legally sound.
Test and update your incident response plan regularly
An IRP is not a one-time project but an ongoing process. Regularly test your plan through simulations and tabletop exercises. Update the plan as needed based on changes in your practice, emerging threats, and lessons learned from incidents and tests. Conducting regular tests can help identify gaps or weaknesses in your plan before an actual incident occurs.
Conclusion
Incident response planning is a critical component of cybersecurity for small law firms and solo practitioners. By following these best practices, legal professionals can better protect their practices from cyber threats, maintain client trust and ensure continuity of operations.
Disclaimer:
The content is intended for general informational purposes only and should not
be construed as legal advice. If you require legal or professional advice,
please contact an attorney.
Submit your own column for publication to Diana Bosetti
For reprint rights or to order a copy of your photo:
Email
Jeremy_Ellis@dailyjournal.com
for prices.
Direct dial: 213-229-5424
Send a letter to the editor:
Email: letters@dailyjournal.com