Legal

The Ultimate Law Firm Cybersecurity Checklist for 2026

By Albatross Editorial Team

Executive Summary

Your law firm is a target. According to the 2023 ABA Cybersecurity TechReport, 29% of law firms experienced a security breach in the past year. The average cost? $5.08 million for larger firms; potentially business-ending for smaller practices.

99.9%
of attacks blocked by MFA
24 days
average ransomware downtime
$5.08M
average breach cost

The 5 Things You Must Do Immediately:

  1. Enable multi-factor authentication (MFA) on all accounts—this single step blocks 99.9% of account compromises
  2. Verify your backups work—actually test restoring files, don't just assume
  3. Implement a wire transfer verification protocol—always callback to verify wiring instructions
  4. Train your staff—one untrained employee clicking one bad link can compromise everything
  5. Create a one-page incident response plan—know who to call before disaster strikes

Key Statistics You Need to Know:

  • 61% of cyberattacks target small and mid-sized businesses
  • 90%+ of attacks begin with a phishing email
  • 40% of clients would fire a firm that experienced a breach
  • Only 34% of law firms have an incident response plan
  • $2.7 billion lost to business email compromise in 2024 (FBI)

Budget Guidance:

Plan for $150-$300 per user per month for comprehensive managed IT with security. A 10-person firm should budget $1,500-$3,000 monthly. This covers endpoint protection, email security, backup, and help desk support.

Bottom line: Cybersecurity isn't optional—it's an ethical obligation under ABA Model Rule 1.6. This checklist gives you a practical roadmap to protect your clients, your reputation, and your livelihood.

Case Study: When a Small Firm Gets Hit

The following is a composite scenario based on real incidents reported to state bars and cyber insurance carriers. Names and details have been changed.

The Firm: Morriston & Associates, a 7-attorney estate planning practice in suburban Ohio

Anatomy of an Attack: How a 7-Attorney Firm Lost $187,000

Day 1, 9:47 AM
Paralegal clicks phishing link, enters credentials on fake Microsoft page
Day 1, 11:30 AM
Attackers access email, study communication patterns
Day 3, 2:15 PM
Fraudulent wire instructions sent to client from compromised account
Day 3, 3:00 PM
Client wires $187,000 to attacker-controlled account
Day 5, 10:00 AM
Breach discovered. Funds unrecoverable.

The Aftermath:

  • $187,000 in client funds—unrecoverable
  • $45,000 in forensic investigation and legal fees
  • Malpractice claim filed by the client
  • State bar complaint and ethics investigation
  • Notification letters to 340 clients whose data was potentially accessed
  • Two clients terminated their relationships

What Could Have Prevented This:

  • MFA on email accounts (attacker couldn't have logged in with just the password)
  • Wire verification protocol (callback to known number before any wire transfer)
  • Phishing training (paralegal would have recognized the fake login page)
  • Email security tools (Defender for Office 365 would have flagged the suspicious link)
Cost of Prevention
$300/month
Cost of Breach
$250,000+

Introduction: The Stakes Have Never Been Higher

Your firm sits on a goldmine of sensitive data—client secrets, financial records, intellectual property, and litigation strategies. That makes you a prime target for cybercriminals. The 2023 ABA Cybersecurity TechReport found that 29% of law firms experienced a security breach in the past year. When you factor in firms that have ever experienced a breach or don't know if they have, that number climbs to nearly 40%.

The financial impact is staggering. The average cost of a data breach for larger law firms in 2024 was $5.08 million—a 10% increase from the previous year. For smaller practices, the average breach cost of $36,000 can be devastating enough to threaten your firm's survival.

But here's what should really get your attention: your clients are watching. A 2025 survey found that 37% of legal clients would pay a premium for firms with stronger cybersecurity measures, while 40% would fire or consider firing a firm that experienced a breach. In a trust-based profession, one incident can unravel decades of reputation building.

Recent settlements underscore the stakes. Orrick, Herrington & Sutcliffe paid $8 million after a 2023 breach exposed data from over 600,000 individuals. Gunster Yoakley & Stewart settled for $8.5 million following a ransomware attack. These aren't just big-firm problems—small practices face the same lawsuits and ethics complaints when breaches occur.

"Firms must view confidentiality not only as a legal obligation but as a commercial imperative. Testing breach readiness should be as routine as reviewing contracts."

— Philip Tansley, Crisis Management Partner, Osborne Clarke

This isn't just about protecting your business—it's about your ethical obligations. ABA Model Rule 1.6 requires lawyers to make reasonable efforts to prevent unauthorized access to client information. Many state bars have issued specific cybersecurity guidance or ethics opinions—check your jurisdiction's requirements. What was "reasonable" five years ago no longer cuts it.


7 Dangerous Cybersecurity Myths—Exposed

Before diving into the checklist, let's clear up some dangerous misconceptions that put law firms at risk every day.

MYTH #1: "We're too small to be targeted"

Reality: This is the most dangerous myth in cybersecurity. The data tells a completely different story: 51% of small businesses have no cybersecurity measures at all, and 61% of cyberattacks target small and medium businesses (Accenture, 2024). Criminals know smaller firms typically have weaker defenses and are less likely to detect intrusions quickly. You're not too small to be targeted—you're the perfect size.

MYTH #2: "Antivirus software is enough protection"

The truth: Traditional antivirus relies on signature-based detection—it can only catch known threats. Modern attackers use fileless malware, zero-day exploits, and behavioral manipulation that bypass signature detection entirely. Today's threats require Endpoint Detection and Response (EDR) solutions that analyze behavior patterns and respond to attacks in real-time. If you're relying solely on antivirus, you're bringing a knife to a gunfight.

MYTH #3: "Compliance equals security"

Wrong. As attorneys, you think in compliance terms—but checking boxes on a checklist doesn't mean you're actually secure. Many firms assume that meeting minimum requirements means they're protected. Compliance is a baseline, not a ceiling. Real security requires ongoing vigilance, regular testing, and adapting to evolving threats—not just passing an annual audit or renewing your cyber insurance.

MYTH #4: "Cybersecurity is IT's responsibility, not mine"

False. IBM found that human error was a contributing cause in 95% of all cybersecurity incidents (IBM Security, 2024). Your receptionist clicking a phishing link, a partner using "Password123" for their email, a departing associate whose access wasn't revoked—these are the real vulnerabilities. As CISA states: "Cybersecurity is about culture as much as it is about technology." Every person in your firm is either part of your defense or part of your vulnerability.

MYTH #5: "We have cyber insurance, so we're covered"

Think again. Here's a sobering statistic: 80% of law firms had at least one technology insurance policy, yet only 34% had an incident response plan (ABA, 2023). Insurance doesn't prevent breaches, doesn't restore your reputation, and increasingly won't pay out if you lack basic security controls. Many policies now exclude coverage for firms without multi-factor authentication, regular backups, or employee training. Insurance is your safety net, not your security strategy.

MYTH #6: "Strong passwords are sufficient security"

Not anymore. Microsoft's data shows that more than 99.9% of compromised accounts did not have multi-factor authentication enabled (Microsoft Security, 2023). Passwords—no matter how complex—can be stolen, guessed, or cracked. MFA adds a second verification layer that stops the vast majority of credential-based attacks cold. Without MFA, a strong password is just a speed bump.

MYTH #7: "If hackers want in, they'll get in anyway"

Defeatist—and wrong. This thinking ignores reality. Strong security measures dramatically lower the likelihood of a successful attack. Organizations that implement security awareness training see phishing susceptibility drop by over 40% in just 90 days—and up to 86% within a year (KnowBe4, 2024). Criminals look for easy targets. Basic security hygiene makes you a harder target, and most attackers will simply move on to easier prey.


Warning Signs: Has Your Firm Been Breached?

Nearly 1 in 5 firms aren't sure whether they've been breached (ABA, 2023). Here are the warning signs you shouldn't ignore:

Email & Account Red Flags:

  • Login notifications from unfamiliar locations or devices
  • Clients reporting strange emails "from you" that you didn't send
  • Emails in your "Sent" folder you don't recognize
  • Password reset emails you didn't request
  • MFA prompts when you're not trying to log in

System & Network Red Flags:

  • Computers running unusually slowly
  • Programs launching or closing on their own
  • Files missing, renamed, or encrypted
  • New programs you didn't install
  • Antivirus or security software disabled without explanation

Financial Red Flags:

  • Unauthorized transactions on firm accounts
  • Vendors reporting they received payment instructions you didn't send
  • Unexpected changes to direct deposit information
⚠️ If you notice any of these signs: Don't ignore them. Contact your IT provider immediately for investigation. Time matters—the faster you respond, the more you can limit damage.

PRIORITY TIER 1: Critical Controls

⏱ Implement Within 30 Days

1. Multi-Factor Authentication (MFA)

The Single Most Impactful Security Control You Can Implement

If you only do one thing after reading this checklist, enable MFA everywhere. The statistics are overwhelming:

99.9% of account compromises are blocked by MFA (Microsoft, 2023)
99% less likely to be hacked with MFA enabled (CISA, 2024)
4.8x more likely to experience a breach without MFA (Verizon DBIR, 2024)

Despite this, 62% of small to mid-sized organizations still don't use MFA (Cyber Readiness Institute, 2024). A separate survey found that among firms with 25 or fewer employees, adoption drops to just 27% (ABA, 2023). This gap represents both your competitive advantage and your vulnerability.

"Multi-factor authentication is no longer a luxury nor an optional security feature—it's a fundamental necessity in today's digital landscape."

— Karen S. Evans, Managing Director, Cyber Readiness Institute

Real-World Consequence: The Colonial Pipeline attack—which caused fuel shortages across the Eastern U.S.—started because a single VPN account lacked MFA. One missing security control led to a $4.4 million ransom payment and national crisis.

MFA Checklist:

  • Enable MFA on Microsoft 365 / Google Workspace (IT Provider, 30 min)
  • Enable MFA on practice management software—Clio, MyCase, etc. (IT Provider, 30 min)
  • Enable MFA on client portals (IT Provider, 30 min)
  • Enable MFA on banking/financial accounts (Managing Partner, 15 min)
  • Require MFA for all remote access—VPN, remote desktop (IT Provider, 1 hour)

How to Implement (Microsoft 365):

  1. Sign in to the Microsoft 365 admin center (admin.microsoft.com)
  2. Navigate to Settings > Org settings > Security & privacy
  3. Select Multi-factor authentication
  4. Enable Security Defaults (free) or configure Conditional Access (Business Premium)
ℹ️ Cost: $0 with existing Microsoft 365 subscription (Security Defaults).

2. Email Security & Phishing Defense

Your Inbox Is Your Biggest Vulnerability

Over 90% of cyberattacks begin with a phishing email. For law firms, the stakes are particularly high: the FBI has warned specifically about groups like the Silent Ransom Group targeting law firms, stealing client data, and threatening to leak information unless ransoms are paid.

68% of phishing breaches in small businesses started with one untrained employee (Verizon DBIR, 2024)
$2.7B lost to Business Email Compromise in 2024 (FBI IC3 Report)
$4.91M average cost of a phishing-related data breach (IBM, 2024)
💡 AI-Powered Threats Are Escalating: Attackers are now using AI to craft more convincing phishing emails and even deepfake voice calls. If someone calls claiming to be a client with urgent wire instructions, verify independently—even if the voice sounds familiar. AI can now clone voices from just a few seconds of audio.

🔒 Wire Transfer Verification Protocol

Post this by every phone. Train every employee. No exceptions.

  1. Step 1: NEVER send funds based on emailed wiring instructions alone.
  2. Step 2: Call the sender to verify—use a phone number you already have on file, NOT from the email.
  3. Step 3: Ask the recipient to confirm the last 4 digits of the account number verbally.
  4. Step 4: Document the verification (who you called, when, what they confirmed) in the file.
  5. Step 5: If anything feels off, STOP. Delay the wire until you can verify in person or through a second channel.

Email Security Checklist:

  • Configure SPF, DKIM, DMARC records (IT Provider, 2 hours)
  • Enable Defender for Office 365 or equivalent (IT Provider, 1 hour)
  • Implement wire transfer verification protocol (Managing Partner, 30 min)
  • Deploy email encryption for client communications (IT Provider, 1 hour)
  • Establish policy: no sensitive data via unencrypted email (Managing Partner, 30 min)

Microsoft 365 Security Features to Enable: Microsoft 365 Business Premium ($22/user/month) includes Defender for Office 365 Plan 1: Safe Links (real-time URL scanning), Safe Attachments (sandboxing suspicious files), anti-spoofing controls, and impersonation protection. These catch malicious content that basic email filters miss. Ask your IT provider to enable these features and review the security dashboard monthly.

3. Backup & Ransomware Recovery

Your Last Line of Defense When Everything Else Fails

Ransomware has become the existential threat for small law firms. The numbers are sobering:

88% of breaches at small and mid-sized businesses involved ransomware (Sophos, 2024)
24 days average downtime after a ransomware attack (Coveware, 2024)
60% of small businesses that suffer a cyberattack close within 6 months (National Cyber Security Alliance)
69% of businesses that paid a ransom were attacked again (Cybereason, 2024)

Small businesses hit by ransomware can expect to pay $120,000 to $1.24 million in total response and recovery costs (NetDiligence, 2024). But here's the good news: 97% of organizations with encrypted data were able to recover it, and 54% did so using backups rather than paying ransoms.

"An immutable backup you can restore from is the #1 antidote to recovering from the venom of a cyber-attack such as ransomware."

— Sharon Nelson & John Simek, Above the Law, January 2025

Backup Checklist:

  • Implement 3-2-1 rule: 3 copies, 2 media types, 1 offsite (IT Provider, 4 hours)
  • Create air-gapped or immutable backup (IT Provider, 2 hours)
  • Test backup restoration quarterly—actually restore files (IT Provider, 2 hours)
  • Document Recovery Time Objective: how long can you be down? (Managing Partner, 1 hour)
  • Encrypt all backup data (IT Provider, 1 hour)
💡 Critical Question: When was the last time you actually tested restoring from your backup? If you can't answer that question, schedule a test this week. Backups that haven't been verified are just assumptions.

PRIORITY TIER 2: Essential Controls

⏱ Implement Within 90 Days

4. Endpoint Protection: Beyond Basic Antivirus

If you're still relying on traditional antivirus software, you're using yesterday's tools against today's threats. Modern attacks require Endpoint Detection and Response (EDR)—think of it as antivirus with a brain.

Traditional Antivirus

  • Signature-based only
  • Misses new threats
  • No behavioral analysis
  • Basic quarantine
  • Minimal forensics

EDR (Recommended)

  • Behavioral analysis
  • Catches zero-day attacks
  • Real-time monitoring
  • Automated containment
  • Full investigation tools

Our Recommendation:

Firms under 15 employees: Microsoft Defender for Business (included in Business Premium at $22/user/month). This provides enterprise-grade EDR without additional cost if you're already on Business Premium.

Firms with 15-50 employees: Consider dedicated EDR solutions like SentinelOne, CrowdStrike, or Sophos MDR (Managed Detection and Response) which includes 24/7 monitoring by security experts.

Endpoint Protection Checklist:

  • Upgrade from basic antivirus to EDR solution (IT Provider, 2-4 hours)
  • Enable automatic updates for all security software (IT Provider, 30 min)
  • Configure protection on ALL devices including Mac and mobile (IT Provider, 2 hours)
  • Enable full-disk encryption: BitLocker (Windows), FileVault (Mac) (IT Provider, 1 hour)
  • Implement USB/removable media policy (Managing Partner, 30 min)

5. Access Control & Password Management

Microsoft's systems face over 1,000 password attacks every second. In 2024, 29% of ransomware attacks relied on compromised credentials as the initial entry point (Verizon DBIR). Weak passwords and shared accounts are open invitations for attackers.

Access Control Checklist:

  • Deploy enterprise password manager—Bitwarden, 1Password (IT Provider, 2 hours)
  • Implement least privilege: staff only access what they need (IT Provider, 2 hours)
  • Create separate admin accounts from daily-use accounts (IT Provider, 1 hour)
  • Establish immediate access termination for departing employees (Office Manager, 30 min)
  • Schedule quarterly access reviews (Managing Partner, 1 hour/quarter)

6. Network Security

Outdated software and hardware with known vulnerabilities are easy targets. Unpatched systems are like leaving your front door unlocked with a sign that says "Please rob me."

Network Security Checklist:

  • Review firewall rules, not just status (IT Provider, 2 hours)
  • Secure Wi-Fi: WPA3, hidden SSID for staff, separate guest network (IT Provider, 1 hour)
  • Implement VPN for all remote access (IT Provider, 2 hours)
  • Schedule quarterly vulnerability scanning (IT Provider, ongoing)
  • Segment network: keep client data separate from general network (IT Provider, 4 hours)

7. Mobile Device & Remote Work Security

With attorneys increasingly working from phones, tablets, and home offices, mobile and remote security is critical. A lost phone with unencrypted client data is a breach waiting to happen.

Mobile & Remote Security Checklist:

  • Require device passcodes/biometrics on all mobile devices (Managing Partner)
  • Enable remote wipe capability for lost/stolen devices (IT Provider)
  • Prohibit storing client documents on personal devices without encryption
  • Require VPN use when working from public Wi-Fi (coffee shops, airports)
  • Consider Mobile Device Management (MDM) for firm devices (IT Provider)
  • Establish secure document handling procedures for home offices

PRIORITY TIER 3: Important Controls

⏱ Implement Within 6 Months

8. Security Awareness Training

Your staff are either your strongest defense or your weakest link. With 33% of employees susceptible to phishing attacks out of the gate, training isn't optional—it's essential.

The good news: organizations that implement security awareness training see phishing susceptibility drop by over 40% in just 90 days—and up to 86% within a year (KnowBe4, 2024). Firms that conduct regular training have seen a 50% reduction in successful phishing attacks.

"Cybersecurity should be top-of-mind for every attorney. Constant vigilance is needed to keep our data safe and secure."

— ABA Legal Technology Resource Center, 2023 Cybersecurity TechReport

Training Checklist:

  • Implement annual security awareness training for all staff (Office Manager)
  • Conduct monthly phishing simulations (IT Provider)
  • Include security in new hire onboarding (Office Manager)
  • Establish no-blame reporting culture for suspected phishing (Managing Partner)
  • Send quarterly security reminders and threat updates (Managing Partner)

Training Platforms:

  • KnowBe4: $15-25/user/year, excellent phishing simulations
  • Microsoft Attack Simulation: Included in Defender for Office 365
  • Proofpoint Security Awareness Training

9. Incident Response Planning

80% of law firms had at least one technology insurance policy, yet only 34% had an incident response plan (ABA, 2023). Even more concerning: 65% of firms were unfamiliar with their legal obligations following a breach.

"Review and approve the Incident Response Plan. Give it the attention it deserves in 'peace time'... There will be no time to digest and refine it during an incident."

— CISA, Cyber Guidance for Small Businesses

Incident Response Checklist:

  • Create written incident response plan (see template below) (Managing Partner)
  • Designate response team and emergency contact list (Managing Partner)
  • Document client notification procedures and timelines (Managing Partner)
  • Establish relationship with forensics vendor BEFORE you need them (Managing Partner)
  • Review and test the plan annually (Managing Partner)

📋 Incident Response Plan Template (1-Page Version)

1. Detection & Initial Response (First 15 Minutes)

  • Who discovered the issue? Document the time and initial observations
  • Immediately notify: [Managing Partner name/phone]
  • DO NOT turn off computers or delete anything (preserve evidence)

2. Containment (First Hour)

  • Disconnect affected devices from network (unplug ethernet, disable Wi-Fi)
  • Contact IT Provider: [Company name / 24-hour number]
  • Change passwords for any potentially compromised accounts

3. Key Contacts

  • IT Provider: [Name, phone, email]
  • Cyber Insurance Carrier Hotline: [Phone number, policy number]
  • Forensics Vendor: [Name, phone] (establish relationship in advance)
  • Legal Counsel (if external): [Name, phone]

4. Communication

  • Internal: [Who notifies staff and what they should/shouldn't say]
  • Client notification: Check state breach notification laws (typically 30-60 days)
  • DO NOT discuss incident on social media or with press without counsel

10. Vendor & Third-Party Risk

Your security is only as strong as your weakest vendor. In 2023, a data breach at Bryan Cave Leighton Paisner resulted in unauthorized access to personal data of its client Mondelez International, impacting more than 51,000 current and former employees. The breach wasn't at Mondelez—it was at their law firm.

Questions to Ask Your Vendors:

  1. Do you have SOC 2 Type II certification? (Request the report)
  2. Is data encrypted at rest and in transit?
  3. Do you support multi-factor authentication?
  4. What is your incident response process and notification timeline?
  5. Where is our data stored? (Country/jurisdiction matters)
  6. Who at your company can access our data?
  7. What happens to our data if we terminate the relationship?

Client Portal Security: If you use a client portal, verify it requires MFA for client access, encrypts all documents, logs access for audit trails, and allows you to revoke access immediately when matters close. A compromised client portal is a direct path to your most sensitive documents.

11. Cyber Insurance

Only 40% of law firms carry cyber liability insurance—down from 46% in previous years (ABA, 2023). Yet insurance is increasingly essential as breach costs rise and clients demand protection. Most policies now require proof of basic security controls before they'll pay out.

Cyber Insurance Checklist:

  • Obtain cyber liability insurance (Managing Partner)
  • Understand coverage limits, exclusions, and retroactive date
  • Document security controls for application requirements
  • Review policy annually as your firm grows
  • Know your carrier's breach response hotline by heart

12. When to Hire IT Help

Most small law firms don't need a full-time IT person—but you do need professional IT support. Here's what to expect:

Firm Size Recommended Approach Monthly Cost
1-10 employees Part-time IT consultant + cloud tools $500-$1,500
10-25 employees Managed Service Provider (MSP) $2,000-$4,000
25-50 employees MSP with dedicated account manager $5,000-$10,000

What to Look for in an MSP:

  • Legal industry experience (understands your practice management software)
  • SOC 2 certification
  • 24/7 monitoring capability
  • Clear SLAs and response times in writing
  • Cybersecurity focus (not just "IT support")

Red Flags to Avoid:

  • No documented security policies
  • "We'll handle everything" without specifics
  • No regular security reporting
  • No experience with legal practice management software
  • Resistance to answering security questions about their own practices

Frequently Asked Questions

Q: How much should a small law firm budget for cybersecurity?

A: Plan for $150-$300 per user per month for comprehensive managed IT with security. A 10-person firm should budget $1,500-$3,000 monthly. This typically includes endpoint protection, email security, backup, and help desk support. Firms handling high-value matters (M&A, IP litigation) should budget more for enhanced monitoring.

Q: We use Microsoft 365—aren't we already protected?

A: Microsoft 365 includes basic security, but default settings aren't optimized for law firm security. You need to enable Security Defaults (or Conditional Access), turn on Defender for Office 365 features, and configure email authentication (SPF, DKIM, DMARC). Microsoft 365 Business Premium ($22/user/month) adds significantly better protection than basic plans. Ask your IT provider to review your security settings.

Q: What's the first thing we should do if we suspect a breach?

A: Invoke your incident response plan immediately—even if it turns out to be a false alarm. Disconnect affected systems from the network (unplug, don't power off), preserve evidence, contact your IT provider and cyber insurance carrier, and document everything with timestamps. DO NOT pay any ransom without consulting legal counsel and your insurer first.

Q: How often should we conduct security training?

A: Annual formal training is the minimum, but monthly phishing simulations are recommended. Data shows organizations with regular training see phishing susceptibility drop by 40% in 90 days. Brief quarterly reminders about current threats (like AI-generated phishing) are also valuable.

Q: Do we need cyber insurance if we have good security?

A: Yes. Even firms with excellent security can be breached—69% of businesses believed they were well-prepared before they were attacked. Insurance provides financial protection for incident response, client notification, legal defense, regulatory fines, and business interruption. Think of it as malpractice insurance for your data.

Q: Are cloud-based practice management systems secure?

A: Reputable cloud providers often have better security than most small firms can achieve on-premises—they have dedicated security teams, 24/7 monitoring, and enterprise-grade infrastructure. Look for SOC 2 Type II certification, encryption at rest and in transit, and MFA support. Clio, MyCase, and similar major platforms invest heavily in security.

Q: What about using AI tools like ChatGPT with client information?

A: Exercise extreme caution. Unless you're using an enterprise version with a data processing agreement, anything you enter may be used to train the AI and could potentially be surfaced to others. Never enter client names, case details, confidential information, or privileged communications into consumer AI tools. Check your state bar's guidance on AI use.

Q: What are our ethical obligations around cybersecurity?

A: ABA Model Rule 1.6 requires "reasonable efforts" to prevent unauthorized access to client information. ABA Formal Opinion 483 (2018) addresses breach notification obligations. Many state bars have issued specific guidance—California, Florida, New York, and Texas have particularly detailed requirements. Check your jurisdiction and stay current on developments.


Annual Security Review Calendar

Use this calendar to stay on top of recurring security tasks. Assign ownership and track completion.

Frequency Task Owner
Monthly Phishing simulation IT Provider
Monthly Review security alerts/dashboard IT Provider
Monthly Check backup status reports IT Provider
Quarterly Test backup restoration IT Provider
Quarterly Access rights review (who has access to what) Managing Partner
Quarterly Vulnerability scan IT Provider
Quarterly Review departed employee access Office Manager
Semi-Annual Security awareness refresher Office Manager
Semi-Annual Incident response plan tabletop exercise Managing Partner
Annual Full security awareness training All Staff
Annual Cyber insurance policy review Managing Partner
Annual Vendor security assessment Managing Partner
Annual Password policy review IT Provider
Annual Incident response plan update Managing Partner

Cybersecurity Budget Worksheet

Use this worksheet to estimate your annual cybersecurity investment. Costs vary by region and provider.

Your Firm: _____ employees

Item Typical Range Your Estimate
Microsoft 365 Business Premium $22/user/month $_____/year
Managed IT Services (if applicable) $150-300/user/month $_____/year
Security Awareness Training $15-25/user/year $_____/year
Additional EDR (if not using M365) $5-15/user/month $_____/year
Cloud Backup $5-15/user/month $_____/year
Password Manager $3-8/user/month $_____/year
Cyber Insurance Premium $1,500-5,000/year $_____/year
Annual Security Assessment $1,000-3,000 $_____
TOTAL ESTIMATED ANNUAL COST $_____
ℹ️ Rule of thumb: Plan to invest 3-5% of your IT budget (or $150-300/user/month) on security. For a 10-person firm, that's roughly $18,000-$36,000 annually. Compare that to the average breach cost of $36,000+ for small practices—prevention is far cheaper than recovery.

Where Do Law Firm Breaches Begin?

Phishing / Email Compromise
90%
Compromised Credentials
29%
Unpatched Software
20%
Insider Threats
12%

Conclusion: Your 10-Point Action Plan

You don't have to fix everything overnight. Start with these ten high-impact actions:

# Action Timeline Owner
1 Enable MFA on email TODAY IT Provider
2 Enable MFA on practice management This Week IT Provider
3 Verify backup exists and test restoration This Week IT Provider
4 Implement wire verification protocol This Week Managing Partner
5 Review M365 security settings Next Week IT Provider
6 Schedule first phishing simulation This Month IT Provider
7 Review cyber insurance coverage This Month Managing Partner
8 Create 1-page incident response plan This Month Managing Partner
9 Evaluate endpoint protection This Quarter IT Provider
10 Schedule security awareness training This Quarter Office Manager

"No business is too small to be a target. From ransomware to phishing, cyber threats are growing. In 2024, the FBI reported over $2.7 billion in losses from business email compromise alone."

— CISA, Cybersecurity and Infrastructure Security Agency

Resources:


Final thought: Cybersecurity isn't a one-time project—it's an ongoing commitment. The threats will continue to evolve, but so will your defenses. Start with the basics, build good habits, and make security part of your firm's culture. Your clients are trusting you with their most sensitive information. Honor that trust.