Skip to content
Law Society of Scotland
Search
Find a Solicitor
Contact us
About us
Sign in
Search
Find a Solicitor
Contact us
About us
Sign in
  • For members

    • For members

    • CPD & Training

    • Membership and fees

    • Rules and guidance

    • Regulation and compliance

    • Journal

    • Business support

    • Career growth

    • Member benefits

    • Professional support

    • Lawscot Wellbeing

    • Lawscot Sustainability

  • News and events

    • News and events

    • Law Society news

    • Blogs & opinions

    • CPD & Training

    • Events

  • Qualifying and education

    • Qualifying and education

    • Qualifying as a Scottish solicitor

    • Career support and advice

    • Our work with schools

    • Lawscot Foundation

    • Funding your education

    • Social mobility

  • Research and policy

    • Research and policy

    • Research

    • Influencing the law and policy

    • Equality and diversity

    • Our international work

    • Legal Services Review

    • Meet the Policy team

  • For the public

    • For the public

    • What solicitors can do for you

    • Making a complaint

    • Client protection

    • Find a Solicitor

    • Frequently asked questions

    • Your Scottish solicitor

  • About us

    • About us

    • Contact us

    • Who we are

    • Our strategy, reports and plans

    • Help and advice

    • Our standards

    • Work with us

    • Our logo and branding

    • Equality and diversity

  1. Home
  2. For members
  3. Journal Archive
  4. Issues
  5. March 2022
  6. Cybersecurity actions for 2022

Cybersecurity actions for 2022

The current areas of highest risk for legal practices from cybercrime, and the steps managers should be taking to check how vulnerable their firm is to attack
14th March 2022 | David Fleming

Millions of cyberattacks will take place across the UK in 2022, and many thousands of businesses will be seriously damaged. They will include law firms. The firms which avoid damage will be those that have taken proactive steps to protect themselves. To help you join this group of secure businesses I have outlined a plan below that I hope will help.

Cybercriminals earn huge sums from their activity, and the sheer size of this opportunity means that attacks will inevitably increase in 2022. The advance and availability of attack technology and the use of AI (artificial intelligence) mean that criminals can now discover and evaluate opportunities in every business, whatever the sector, regardless of the size. So we need to start by understanding your vulnerabilities.

Cybersecurity vulnerabilities in 2022

A successful attack can make money for the criminals in a number of ways. They may trick a human (staff/customer/supplier) into sending money to a fraudulent bank account. Or they may steal something valuable, such as sensitive confidential proprietary or client information, in order to blackmail you into paying a ransom for its return. That confidential information may still then be used to attack you or your clients or extort money from them. Ransoms are also frequently paid in order to regain business functionality, after criminals have encrypted data and systems.

The criminals first find a way into your practice through the gaps in your defences (these are known as vulnerabilities). We assess many law firms each year, and set out below are the areas we are currently finding provide most opportunity for the criminals. I suggest you read through the list, noting where the risk applies to you.

Remote working. Staff working away from the office provide lots of attack opportunities. Have you specifically reviewed your remote working setup from a cybersecurity perspective?

Have a look at the video here for some pointers on how well you’ve set-up your remote working.

Cloud email accounts. Thousands of email accounts are hijacked weekly and exploited by criminals.

  1. Authentication methods. Just relying on username and passwords is not enough. Typically over 20% of untrained staff fall for the simulated phishing email attacks that we run for clients. This is how usernames and passwords are stolen.
  2. Spoofing controls. Ask your technical support if they have set up SPF, DKIM and DMARC. And worry if they don’t know what you are talking about.

Business technology. Some of the biggest attacks last year were from poorly maintained technology.

Software patching. Having an effective patching regime is critical to your cyber resilience.  Two huge cyberattacks in 2021 took place when critical security patches were released by suppliers, which in turn notified everyone (including criminals) of newly discovered software flaws. How would you have fared against these two examples below, and who is watching out for issues that affect the technology you use?

    • (a) https://www.theguardian.com/world/2021/jul/19/what-is-the-hafnium-microsoft-hack-and-why-has-the-uk-linked-it-to-china
    • (b) https://www.wired.com/story/log4j-flaw-hacking-internet/

Staff digital behaviour. Most successful attacks rely on human error at some stage, which is why staff training combined with proper governance is so important. 

  1. Passwords. How disciplined are you? Do staff use strong passwords, and do they know how dangerous it is to use work emails and passwords for non-work purposes? And do you really know whether the rules you set are being enforced?
  2. Information transfer. Are you really in control of the way data is transferred and stored? Or might we find company information in G-drives, DropBoxes, and on WeTransfer? 
  3. Speed and trust. How quick are staff to trust and press links on their mobile phones? Might your staff fall for the criminals’ ever more sophisticated tricks?

Cloud services. At its worst, cloud can mean loss of control and lack of risk visibility.

Have a look at the video here for some pointers on how well you’ve set-up your cloud services.

Supply chain weaknesses. Third parties who provide services to your organisation are often one of the weakest links in your cybersecurity. Most commentators are predicting a growth in supply chain attacks this year. This article from the NCSC is a good explanation of the risks involved.

Cybersecurity action plan for 2022

Cybersecurity vulnerability assessment. You must start by identifying your biggest risks and the vulnerabilities that need closing.

The list of common vulnerabilities mentioned above is a good starting point for this process. Consider how well each of those areas has been set up. Do you have evidence that cybersecurity has been properly considered? Make sure you review where your valuable information is kept and the way your payments process operates, as these are common targets.

You may have heard of cybersecurity buzzwords like penetration testing, vulnerability assessments, and network security scanning, which will all help you assess your vulnerability to attack. A good starting point would be to use our assessment tool.

Cybersecurity policy. Define how the business will work to reduce risk, e.g. what is acceptable personal use of a work device.

We recommend that you define your policy in key areas. Examples include digital usage and behaviour, passwords and access management, and information storage and transfer. Then make sure all staff are aware of the rules and what is expected of them. 

You must have in place a defined policy for software patching, backup testing and virus protection to include clarity on actions and responsibilities. It is then important that you find a way of measuring compliance.

This may sound onerous but it is absolutely necessary and it is an expectation of your regulators and the ICO. 

Vulnerability closure, strong controls, and alerts. Once you have completed the steps above, you need to make sure you close the vulnerabilities identified, that technical policies are implemented and that the right system controls are set up to protect you. It is essential that someone suitably qualified advises on how to configure your software and hardware properly from a security perspective.

The work here obviously depends on how your firm operates, but here are just three examples of what we look for during our assessments.

  1. Anti-virus software – is it on every device; is it being kept up to date; can it be locally switched off; has it been “loosened” too much; and is someone centrally viewing the critical alerts?
  2. Windows network patching – are Windows patches being deployed on time to laptops, PCs and servers? How long can a laptop go without a critical patch being deployed?
  3. Email account login failures – if you are on Office365, someone should be being alerted to suspicious login attempts and you should be configuring the controls to restrict who has access to your systems.

Cybersecurity training. Make sure that regular training keeps staff alert to the risks. It’s time to invest in some really good cybersecurity training and we believe that getting simulated attacks done frequently will improve your cybersecurity culture.

Incident response planning. Yes, the worst does sometimes happen. In most cases that I have been involved with, fast, pre-planned emergency response arrangements can massively reduce the impact on your business. This is a subject for another article, but start by getting the key people in a room and discussing how you would go about dealing with a ransomware attack. Write down your plan, communicate it and practise it.

For more information contact Mitigo on 0131 564 1884 or email lawscot@mitigogroup.com

The Author

David Fleming, chief technology officer, Mitigo

Share this article
Add To Favorites
https://lawware.co.uk/

Regulars

  • People on the move: March 2022
  • Book reviews: March 2022
  • Reading for pleasure: March 2022

Perspectives

  • Opinion: Martin O'Brien
  • President's column: March 2022
  • Editorial: International order
  • Viewpoints: Endless arrear?
  • Profile: Elaine MacGlone

Features

  • Forward to the office
  • Fair compensation?
  • Pause for thought
  • FoI: rights needing a new law
  • Prepare for the great tax catch-up

Briefings

  • Civil court: Redaction – completing the picture
  • Corporate: Pandemic procurement: proper preferences?
  • Intellectual property: NFTs and IP rights
  • Agriculture: latest from the Land Court
  • Succession: Changes to reporting for excepted estates
  • Sport: Fan pressure and questions of morality
  • Property: New code for new homes
  • In-house: Democracy behind the scenes

In practice

  • Society Fellows speak out for legal aid
  • Strategy session draws a crowd
  • Ask Ash: Back to the old ways?
  • AML: time for a review, but how?
  • Cryptocurrency? No thank you
  • Going phishing
  • Race: time to be open
  • The Eternal Optimist: IT for dummies

Online exclusive

  • Survivorship and the insolvent estate
  • Cybersecurity actions for 2022
  • Paid leave and backdated claims
  • Exploring imposter syndrome in the legal profession

In this issue

  • Steven Hill: accredited technologist
  • EOTs: a business winner
  • "It's Game On!", law firms say
  • How workflow automation can improve your operations

Recent Issues

Dec 2023
Nov 2023
Oct 2023
Sept 2023
Search the archive

Additional

Law Society of Scotland
Atria One, 144 Morrison Street
Edinburgh
EH3 8EX
If you’re looking for a solicitor, visit FindaSolicitor.scot
T: +44(0) 131 226 7411
E: lawscot@lawscot.org.uk
About us
  • Contact us
  • Who we are
  • Strategy reports plans
  • Help and advice
  • Our standards
  • Work with us
Useful links
  • Find a Solicitor
  • Sign in
  • CPD & Training
  • Rules and guidance
  • Website terms and conditions
Law Society of Scotland | © 2025
Made by Gecko Agency Limited