Executive Summary
Your law firm is a target. According to the 2023 ABA Cybersecurity TechReport, 29% of law firms experienced a security breach in the past year. The average cost? $5.08 million for larger firms; potentially business-ending for smaller practices.
The 5 Things You Must Do Immediately:
- Enable multi-factor authentication (MFA) on all accounts—this single step blocks 99.9% of account compromises
- Verify your backups work—actually test restoring files, don't just assume
- Implement a wire transfer verification protocol—always callback to verify wiring instructions
- Train your staff—one untrained employee clicking one bad link can compromise everything
- Create a one-page incident response plan—know who to call before disaster strikes
Key Statistics You Need to Know:
- 61% of cyberattacks target small and mid-sized businesses
- 90%+ of attacks begin with a phishing email
- 40% of clients would fire a firm that experienced a breach
- Only 34% of law firms have an incident response plan
- $2.7 billion lost to business email compromise in 2024 (FBI)
Budget Guidance:
Plan for $150-$300 per user per month for comprehensive managed IT with security. A 10-person firm should budget $1,500-$3,000 monthly. This covers endpoint protection, email security, backup, and help desk support.
Case Study: When a Small Firm Gets Hit
The Firm: Morriston & Associates, a 7-attorney estate planning practice in suburban Ohio
Anatomy of an Attack: How a 7-Attorney Firm Lost $187,000
The Aftermath:
- $187,000 in client funds—unrecoverable
- $45,000 in forensic investigation and legal fees
- Malpractice claim filed by the client
- State bar complaint and ethics investigation
- Notification letters to 340 clients whose data was potentially accessed
- Two clients terminated their relationships
What Could Have Prevented This:
- MFA on email accounts (attacker couldn't have logged in with just the password)
- Wire verification protocol (callback to known number before any wire transfer)
- Phishing training (paralegal would have recognized the fake login page)
- Email security tools (Defender for Office 365 would have flagged the suspicious link)
Introduction: The Stakes Have Never Been Higher
Your firm sits on a goldmine of sensitive data—client secrets, financial records, intellectual property, and litigation strategies. That makes you a prime target for cybercriminals. The 2023 ABA Cybersecurity TechReport found that 29% of law firms experienced a security breach in the past year. When you factor in firms that have ever experienced a breach or don't know if they have, that number climbs to nearly 40%.
The financial impact is staggering. The average cost of a data breach for larger law firms in 2024 was $5.08 million—a 10% increase from the previous year. For smaller practices, the average breach cost of $36,000 can be devastating enough to threaten your firm's survival.
But here's what should really get your attention: your clients are watching. A 2025 survey found that 37% of legal clients would pay a premium for firms with stronger cybersecurity measures, while 40% would fire or consider firing a firm that experienced a breach. In a trust-based profession, one incident can unravel decades of reputation building.
Recent settlements underscore the stakes. Orrick, Herrington & Sutcliffe paid $8 million after a 2023 breach exposed data from over 600,000 individuals. Gunster Yoakley & Stewart settled for $8.5 million following a ransomware attack. These aren't just big-firm problems—small practices face the same lawsuits and ethics complaints when breaches occur.
"Firms must view confidentiality not only as a legal obligation but as a commercial imperative. Testing breach readiness should be as routine as reviewing contracts."
— Philip Tansley, Crisis Management Partner, Osborne Clarke
This isn't just about protecting your business—it's about your ethical obligations. ABA Model Rule 1.6 requires lawyers to make reasonable efforts to prevent unauthorized access to client information. Many state bars have issued specific cybersecurity guidance or ethics opinions—check your jurisdiction's requirements. What was "reasonable" five years ago no longer cuts it.
7 Dangerous Cybersecurity Myths—Exposed
Before diving into the checklist, let's clear up some dangerous misconceptions that put law firms at risk every day.
Reality: This is the most dangerous myth in cybersecurity. The data tells a completely different story: 51% of small businesses have no cybersecurity measures at all, and 61% of cyberattacks target small and medium businesses (Accenture, 2024). Criminals know smaller firms typically have weaker defenses and are less likely to detect intrusions quickly. You're not too small to be targeted—you're the perfect size.
The truth: Traditional antivirus relies on signature-based detection—it can only catch known threats. Modern attackers use fileless malware, zero-day exploits, and behavioral manipulation that bypass signature detection entirely. Today's threats require Endpoint Detection and Response (EDR) solutions that analyze behavior patterns and respond to attacks in real-time. If you're relying solely on antivirus, you're bringing a knife to a gunfight.
Wrong. As attorneys, you think in compliance terms—but checking boxes on a checklist doesn't mean you're actually secure. Many firms assume that meeting minimum requirements means they're protected. Compliance is a baseline, not a ceiling. Real security requires ongoing vigilance, regular testing, and adapting to evolving threats—not just passing an annual audit or renewing your cyber insurance.
False. IBM found that human error was a contributing cause in 95% of all cybersecurity incidents (IBM Security, 2024). Your receptionist clicking a phishing link, a partner using "Password123" for their email, a departing associate whose access wasn't revoked—these are the real vulnerabilities. As CISA states: "Cybersecurity is about culture as much as it is about technology." Every person in your firm is either part of your defense or part of your vulnerability.
Think again. Here's a sobering statistic: 80% of law firms had at least one technology insurance policy, yet only 34% had an incident response plan (ABA, 2023). Insurance doesn't prevent breaches, doesn't restore your reputation, and increasingly won't pay out if you lack basic security controls. Many policies now exclude coverage for firms without multi-factor authentication, regular backups, or employee training. Insurance is your safety net, not your security strategy.
Not anymore. Microsoft's data shows that more than 99.9% of compromised accounts did not have multi-factor authentication enabled (Microsoft Security, 2023). Passwords—no matter how complex—can be stolen, guessed, or cracked. MFA adds a second verification layer that stops the vast majority of credential-based attacks cold. Without MFA, a strong password is just a speed bump.
Defeatist—and wrong. This thinking ignores reality. Strong security measures dramatically lower the likelihood of a successful attack. Organizations that implement security awareness training see phishing susceptibility drop by over 40% in just 90 days—and up to 86% within a year (KnowBe4, 2024). Criminals look for easy targets. Basic security hygiene makes you a harder target, and most attackers will simply move on to easier prey.
Warning Signs: Has Your Firm Been Breached?
Nearly 1 in 5 firms aren't sure whether they've been breached (ABA, 2023). Here are the warning signs you shouldn't ignore:
Email & Account Red Flags:
- Login notifications from unfamiliar locations or devices
- Clients reporting strange emails "from you" that you didn't send
- Emails in your "Sent" folder you don't recognize
- Password reset emails you didn't request
- MFA prompts when you're not trying to log in
System & Network Red Flags:
- Computers running unusually slowly
- Programs launching or closing on their own
- Files missing, renamed, or encrypted
- New programs you didn't install
- Antivirus or security software disabled without explanation
Financial Red Flags:
- Unauthorized transactions on firm accounts
- Vendors reporting they received payment instructions you didn't send
- Unexpected changes to direct deposit information
PRIORITY TIER 1: Critical Controls
1. Multi-Factor Authentication (MFA)
The Single Most Impactful Security Control You Can Implement
If you only do one thing after reading this checklist, enable MFA everywhere. The statistics are overwhelming:
Despite this, 62% of small to mid-sized organizations still don't use MFA (Cyber Readiness Institute, 2024). A separate survey found that among firms with 25 or fewer employees, adoption drops to just 27% (ABA, 2023). This gap represents both your competitive advantage and your vulnerability.
"Multi-factor authentication is no longer a luxury nor an optional security feature—it's a fundamental necessity in today's digital landscape."
— Karen S. Evans, Managing Director, Cyber Readiness Institute
Real-World Consequence: The Colonial Pipeline attack—which caused fuel shortages across the Eastern U.S.—started because a single VPN account lacked MFA. One missing security control led to a $4.4 million ransom payment and national crisis.
MFA Checklist:
- Enable MFA on Microsoft 365 / Google Workspace (IT Provider, 30 min)
- Enable MFA on practice management software—Clio, MyCase, etc. (IT Provider, 30 min)
- Enable MFA on client portals (IT Provider, 30 min)
- Enable MFA on banking/financial accounts (Managing Partner, 15 min)
- Require MFA for all remote access—VPN, remote desktop (IT Provider, 1 hour)
How to Implement (Microsoft 365):
- Sign in to the Microsoft 365 admin center (admin.microsoft.com)
- Navigate to Settings > Org settings > Security & privacy
- Select Multi-factor authentication
- Enable Security Defaults (free) or configure Conditional Access (Business Premium)
2. Email Security & Phishing Defense
Your Inbox Is Your Biggest Vulnerability
Over 90% of cyberattacks begin with a phishing email. For law firms, the stakes are particularly high: the FBI has warned specifically about groups like the Silent Ransom Group targeting law firms, stealing client data, and threatening to leak information unless ransoms are paid.
🔒 Wire Transfer Verification Protocol
Post this by every phone. Train every employee. No exceptions.
- Step 1: NEVER send funds based on emailed wiring instructions alone.
- Step 2: Call the sender to verify—use a phone number you already have on file, NOT from the email.
- Step 3: Ask the recipient to confirm the last 4 digits of the account number verbally.
- Step 4: Document the verification (who you called, when, what they confirmed) in the file.
- Step 5: If anything feels off, STOP. Delay the wire until you can verify in person or through a second channel.
Email Security Checklist:
- Configure SPF, DKIM, DMARC records (IT Provider, 2 hours)
- Enable Defender for Office 365 or equivalent (IT Provider, 1 hour)
- Implement wire transfer verification protocol (Managing Partner, 30 min)
- Deploy email encryption for client communications (IT Provider, 1 hour)
- Establish policy: no sensitive data via unencrypted email (Managing Partner, 30 min)
Microsoft 365 Security Features to Enable: Microsoft 365 Business Premium ($22/user/month) includes Defender for Office 365 Plan 1: Safe Links (real-time URL scanning), Safe Attachments (sandboxing suspicious files), anti-spoofing controls, and impersonation protection. These catch malicious content that basic email filters miss. Ask your IT provider to enable these features and review the security dashboard monthly.
3. Backup & Ransomware Recovery
Your Last Line of Defense When Everything Else Fails
Ransomware has become the existential threat for small law firms. The numbers are sobering:
Small businesses hit by ransomware can expect to pay $120,000 to $1.24 million in total response and recovery costs (NetDiligence, 2024). But here's the good news: 97% of organizations with encrypted data were able to recover it, and 54% did so using backups rather than paying ransoms.
"An immutable backup you can restore from is the #1 antidote to recovering from the venom of a cyber-attack such as ransomware."
— Sharon Nelson & John Simek, Above the Law, January 2025
Backup Checklist:
- Implement 3-2-1 rule: 3 copies, 2 media types, 1 offsite (IT Provider, 4 hours)
- Create air-gapped or immutable backup (IT Provider, 2 hours)
- Test backup restoration quarterly—actually restore files (IT Provider, 2 hours)
- Document Recovery Time Objective: how long can you be down? (Managing Partner, 1 hour)
- Encrypt all backup data (IT Provider, 1 hour)
PRIORITY TIER 2: Essential Controls
4. Endpoint Protection: Beyond Basic Antivirus
If you're still relying on traditional antivirus software, you're using yesterday's tools against today's threats. Modern attacks require Endpoint Detection and Response (EDR)—think of it as antivirus with a brain.
Traditional Antivirus
- Signature-based only
- Misses new threats
- No behavioral analysis
- Basic quarantine
- Minimal forensics
EDR (Recommended)
- Behavioral analysis
- Catches zero-day attacks
- Real-time monitoring
- Automated containment
- Full investigation tools
Our Recommendation:
Firms under 15 employees: Microsoft Defender for Business (included in Business Premium at $22/user/month). This provides enterprise-grade EDR without additional cost if you're already on Business Premium.
Firms with 15-50 employees: Consider dedicated EDR solutions like SentinelOne, CrowdStrike, or Sophos MDR (Managed Detection and Response) which includes 24/7 monitoring by security experts.
Endpoint Protection Checklist:
- Upgrade from basic antivirus to EDR solution (IT Provider, 2-4 hours)
- Enable automatic updates for all security software (IT Provider, 30 min)
- Configure protection on ALL devices including Mac and mobile (IT Provider, 2 hours)
- Enable full-disk encryption: BitLocker (Windows), FileVault (Mac) (IT Provider, 1 hour)
- Implement USB/removable media policy (Managing Partner, 30 min)
5. Access Control & Password Management
Microsoft's systems face over 1,000 password attacks every second. In 2024, 29% of ransomware attacks relied on compromised credentials as the initial entry point (Verizon DBIR). Weak passwords and shared accounts are open invitations for attackers.
Access Control Checklist:
- Deploy enterprise password manager—Bitwarden, 1Password (IT Provider, 2 hours)
- Implement least privilege: staff only access what they need (IT Provider, 2 hours)
- Create separate admin accounts from daily-use accounts (IT Provider, 1 hour)
- Establish immediate access termination for departing employees (Office Manager, 30 min)
- Schedule quarterly access reviews (Managing Partner, 1 hour/quarter)
6. Network Security
Outdated software and hardware with known vulnerabilities are easy targets. Unpatched systems are like leaving your front door unlocked with a sign that says "Please rob me."
Network Security Checklist:
- Review firewall rules, not just status (IT Provider, 2 hours)
- Secure Wi-Fi: WPA3, hidden SSID for staff, separate guest network (IT Provider, 1 hour)
- Implement VPN for all remote access (IT Provider, 2 hours)
- Schedule quarterly vulnerability scanning (IT Provider, ongoing)
- Segment network: keep client data separate from general network (IT Provider, 4 hours)
7. Mobile Device & Remote Work Security
With attorneys increasingly working from phones, tablets, and home offices, mobile and remote security is critical. A lost phone with unencrypted client data is a breach waiting to happen.
Mobile & Remote Security Checklist:
- Require device passcodes/biometrics on all mobile devices (Managing Partner)
- Enable remote wipe capability for lost/stolen devices (IT Provider)
- Prohibit storing client documents on personal devices without encryption
- Require VPN use when working from public Wi-Fi (coffee shops, airports)
- Consider Mobile Device Management (MDM) for firm devices (IT Provider)
- Establish secure document handling procedures for home offices
PRIORITY TIER 3: Important Controls
8. Security Awareness Training
Your staff are either your strongest defense or your weakest link. With 33% of employees susceptible to phishing attacks out of the gate, training isn't optional—it's essential.
The good news: organizations that implement security awareness training see phishing susceptibility drop by over 40% in just 90 days—and up to 86% within a year (KnowBe4, 2024). Firms that conduct regular training have seen a 50% reduction in successful phishing attacks.
"Cybersecurity should be top-of-mind for every attorney. Constant vigilance is needed to keep our data safe and secure."
— ABA Legal Technology Resource Center, 2023 Cybersecurity TechReport
Training Checklist:
- Implement annual security awareness training for all staff (Office Manager)
- Conduct monthly phishing simulations (IT Provider)
- Include security in new hire onboarding (Office Manager)
- Establish no-blame reporting culture for suspected phishing (Managing Partner)
- Send quarterly security reminders and threat updates (Managing Partner)
Training Platforms:
- KnowBe4: $15-25/user/year, excellent phishing simulations
- Microsoft Attack Simulation: Included in Defender for Office 365
- Proofpoint Security Awareness Training
9. Incident Response Planning
80% of law firms had at least one technology insurance policy, yet only 34% had an incident response plan (ABA, 2023). Even more concerning: 65% of firms were unfamiliar with their legal obligations following a breach.
"Review and approve the Incident Response Plan. Give it the attention it deserves in 'peace time'... There will be no time to digest and refine it during an incident."
— CISA, Cyber Guidance for Small Businesses
Incident Response Checklist:
- Create written incident response plan (see template below) (Managing Partner)
- Designate response team and emergency contact list (Managing Partner)
- Document client notification procedures and timelines (Managing Partner)
- Establish relationship with forensics vendor BEFORE you need them (Managing Partner)
- Review and test the plan annually (Managing Partner)
📋 Incident Response Plan Template (1-Page Version)
1. Detection & Initial Response (First 15 Minutes)
- Who discovered the issue? Document the time and initial observations
- Immediately notify: [Managing Partner name/phone]
- DO NOT turn off computers or delete anything (preserve evidence)
2. Containment (First Hour)
- Disconnect affected devices from network (unplug ethernet, disable Wi-Fi)
- Contact IT Provider: [Company name / 24-hour number]
- Change passwords for any potentially compromised accounts
3. Key Contacts
- IT Provider: [Name, phone, email]
- Cyber Insurance Carrier Hotline: [Phone number, policy number]
- Forensics Vendor: [Name, phone] (establish relationship in advance)
- Legal Counsel (if external): [Name, phone]
4. Communication
- Internal: [Who notifies staff and what they should/shouldn't say]
- Client notification: Check state breach notification laws (typically 30-60 days)
- DO NOT discuss incident on social media or with press without counsel
10. Vendor & Third-Party Risk
Your security is only as strong as your weakest vendor. In 2023, a data breach at Bryan Cave Leighton Paisner resulted in unauthorized access to personal data of its client Mondelez International, impacting more than 51,000 current and former employees. The breach wasn't at Mondelez—it was at their law firm.
Questions to Ask Your Vendors:
- Do you have SOC 2 Type II certification? (Request the report)
- Is data encrypted at rest and in transit?
- Do you support multi-factor authentication?
- What is your incident response process and notification timeline?
- Where is our data stored? (Country/jurisdiction matters)
- Who at your company can access our data?
- What happens to our data if we terminate the relationship?
Client Portal Security: If you use a client portal, verify it requires MFA for client access, encrypts all documents, logs access for audit trails, and allows you to revoke access immediately when matters close. A compromised client portal is a direct path to your most sensitive documents.
11. Cyber Insurance
Only 40% of law firms carry cyber liability insurance—down from 46% in previous years (ABA, 2023). Yet insurance is increasingly essential as breach costs rise and clients demand protection. Most policies now require proof of basic security controls before they'll pay out.
Cyber Insurance Checklist:
- Obtain cyber liability insurance (Managing Partner)
- Understand coverage limits, exclusions, and retroactive date
- Document security controls for application requirements
- Review policy annually as your firm grows
- Know your carrier's breach response hotline by heart
12. When to Hire IT Help
Most small law firms don't need a full-time IT person—but you do need professional IT support. Here's what to expect:
| Firm Size | Recommended Approach | Monthly Cost |
|---|---|---|
| 1-10 employees | Part-time IT consultant + cloud tools | $500-$1,500 |
| 10-25 employees | Managed Service Provider (MSP) | $2,000-$4,000 |
| 25-50 employees | MSP with dedicated account manager | $5,000-$10,000 |
What to Look for in an MSP:
- Legal industry experience (understands your practice management software)
- SOC 2 certification
- 24/7 monitoring capability
- Clear SLAs and response times in writing
- Cybersecurity focus (not just "IT support")
Red Flags to Avoid:
- No documented security policies
- "We'll handle everything" without specifics
- No regular security reporting
- No experience with legal practice management software
- Resistance to answering security questions about their own practices
Frequently Asked Questions
Q: How much should a small law firm budget for cybersecurity?
A: Plan for $150-$300 per user per month for comprehensive managed IT with security. A 10-person firm should budget $1,500-$3,000 monthly. This typically includes endpoint protection, email security, backup, and help desk support. Firms handling high-value matters (M&A, IP litigation) should budget more for enhanced monitoring.
Q: We use Microsoft 365—aren't we already protected?
A: Microsoft 365 includes basic security, but default settings aren't optimized for law firm security. You need to enable Security Defaults (or Conditional Access), turn on Defender for Office 365 features, and configure email authentication (SPF, DKIM, DMARC). Microsoft 365 Business Premium ($22/user/month) adds significantly better protection than basic plans. Ask your IT provider to review your security settings.
Q: What's the first thing we should do if we suspect a breach?
A: Invoke your incident response plan immediately—even if it turns out to be a false alarm. Disconnect affected systems from the network (unplug, don't power off), preserve evidence, contact your IT provider and cyber insurance carrier, and document everything with timestamps. DO NOT pay any ransom without consulting legal counsel and your insurer first.
Q: How often should we conduct security training?
A: Annual formal training is the minimum, but monthly phishing simulations are recommended. Data shows organizations with regular training see phishing susceptibility drop by 40% in 90 days. Brief quarterly reminders about current threats (like AI-generated phishing) are also valuable.
Q: Do we need cyber insurance if we have good security?
A: Yes. Even firms with excellent security can be breached—69% of businesses believed they were well-prepared before they were attacked. Insurance provides financial protection for incident response, client notification, legal defense, regulatory fines, and business interruption. Think of it as malpractice insurance for your data.
Q: Are cloud-based practice management systems secure?
A: Reputable cloud providers often have better security than most small firms can achieve on-premises—they have dedicated security teams, 24/7 monitoring, and enterprise-grade infrastructure. Look for SOC 2 Type II certification, encryption at rest and in transit, and MFA support. Clio, MyCase, and similar major platforms invest heavily in security.
Q: What about using AI tools like ChatGPT with client information?
A: Exercise extreme caution. Unless you're using an enterprise version with a data processing agreement, anything you enter may be used to train the AI and could potentially be surfaced to others. Never enter client names, case details, confidential information, or privileged communications into consumer AI tools. Check your state bar's guidance on AI use.
Q: What are our ethical obligations around cybersecurity?
A: ABA Model Rule 1.6 requires "reasonable efforts" to prevent unauthorized access to client information. ABA Formal Opinion 483 (2018) addresses breach notification obligations. Many state bars have issued specific guidance—California, Florida, New York, and Texas have particularly detailed requirements. Check your jurisdiction and stay current on developments.
Annual Security Review Calendar
Use this calendar to stay on top of recurring security tasks. Assign ownership and track completion.
| Frequency | Task | Owner |
|---|---|---|
| Monthly | Phishing simulation | IT Provider |
| Monthly | Review security alerts/dashboard | IT Provider |
| Monthly | Check backup status reports | IT Provider |
| Quarterly | Test backup restoration | IT Provider |
| Quarterly | Access rights review (who has access to what) | Managing Partner |
| Quarterly | Vulnerability scan | IT Provider |
| Quarterly | Review departed employee access | Office Manager |
| Semi-Annual | Security awareness refresher | Office Manager |
| Semi-Annual | Incident response plan tabletop exercise | Managing Partner |
| Annual | Full security awareness training | All Staff |
| Annual | Cyber insurance policy review | Managing Partner |
| Annual | Vendor security assessment | Managing Partner |
| Annual | Password policy review | IT Provider |
| Annual | Incident response plan update | Managing Partner |
Cybersecurity Budget Worksheet
Use this worksheet to estimate your annual cybersecurity investment. Costs vary by region and provider.
Your Firm: _____ employees
| Item | Typical Range | Your Estimate |
|---|---|---|
| Microsoft 365 Business Premium | $22/user/month | $_____/year |
| Managed IT Services (if applicable) | $150-300/user/month | $_____/year |
| Security Awareness Training | $15-25/user/year | $_____/year |
| Additional EDR (if not using M365) | $5-15/user/month | $_____/year |
| Cloud Backup | $5-15/user/month | $_____/year |
| Password Manager | $3-8/user/month | $_____/year |
| Cyber Insurance Premium | $1,500-5,000/year | $_____/year |
| Annual Security Assessment | $1,000-3,000 | $_____ |
| TOTAL ESTIMATED ANNUAL COST | $_____ |
Where Do Law Firm Breaches Begin?
Conclusion: Your 10-Point Action Plan
You don't have to fix everything overnight. Start with these ten high-impact actions:
| # | Action | Timeline | Owner |
|---|---|---|---|
| 1 | Enable MFA on email | TODAY | IT Provider |
| 2 | Enable MFA on practice management | This Week | IT Provider |
| 3 | Verify backup exists and test restoration | This Week | IT Provider |
| 4 | Implement wire verification protocol | This Week | Managing Partner |
| 5 | Review M365 security settings | Next Week | IT Provider |
| 6 | Schedule first phishing simulation | This Month | IT Provider |
| 7 | Review cyber insurance coverage | This Month | Managing Partner |
| 8 | Create 1-page incident response plan | This Month | Managing Partner |
| 9 | Evaluate endpoint protection | This Quarter | IT Provider |
| 10 | Schedule security awareness training | This Quarter | Office Manager |
"No business is too small to be a target. From ransomware to phishing, cyber threats are growing. In 2024, the FBI reported over $2.7 billion in losses from business email compromise alone."
— CISA, Cybersecurity and Infrastructure Security Agency
Resources:
- CISA Cyber Guidance for Small Businesses: cisa.gov/cyber-guidance-small-businesses
- ABA Cybersecurity Resources: americanbar.org/groups/cybersecurity
- NIST Small Business Cybersecurity Guide: nist.gov/itl/smallbusinesscyber
- FBI Internet Crime Complaint Center: ic3.gov





-01.webp)


%20(Small).jpeg)