Cybersecurity for lawyers

For lawyers, cybersecurity is about protecting sensitive information from cyber threats while ensuring compliance with legal obligations. Legal work is built on trust, confidentiality, and precision. Cybercriminals attempt to exploit each of these.

Why lawyers are targeted

Lawyers handle confidential documents, regulatory matters, litigation strategy, financial transactions, and sensitive negotiations. If a lawyer has their digital identity or account compromised, highly sensitive information can be exposed.

Which of the following BEST explains why lawyers are targeted by cybercriminals?

View Options Again

Where cyberattacks often start

Cyberattacks rarely appear suspicious at first. They masquerade as formal notices, urgent filings, documents, or links to websites that look legitimate and demand immediate attention.

Verify, don't assume

Logos, names, and formal language can be replicated easily. A message can appear official while still being fraudulent. The source of a message should always be verified.

You receive an email claiming to be from a regulator with the correct case number and a link to download documents. What should you do first?

View Options Again

Urgency does not build trust

Deadlines create pressure, but they do not remove the obligation to confirm the authenticity of a request. Cybercriminals rely on urgency to reduce scrutiny and bypass standard procedures.

Cybercriminals often use multiple communication channels

Cybercriminals may use email, phone calls, texts, or meeting invites to make a request feel credible. Just because you've been contacted over multiple communication channels doesn't mean the other party is who they say they are.

You get an urgent email from an unknown address claiming to be a client. Shortly after, you get a call from the client who demands immediate action. What should you do?

View Options Again

Your role carries authority

Cybercriminals may attempt to masquerade as you in an attempt to have a client, colleague, supplier, or partner perform an adverse action. If you’re ever asked to validate the authenticity of a message sent by you, don’t take offense; it’s good cybersecurity hygiene.

Which scenario BEST reflects an impersonation attempt?

View Options Again

What cybercriminals want

Cybercriminals ultimately want you to perform an adverse action. This could be inadvertently providing them with your account credentials, opening a malicious document, or sending a payment, to name a few. To achieve this goal, phishing websites are commonly used. Let’s explore phishing websites further.

Phishing websites can be highly convincing

Phishing websites can be highly deceptive and designed to look and feel exactly like the real thing. It’s important to always look at the domain of the website and check that it matches what’s expected. Wherever possible, avoid clicking links inside emails, and instead use a bookmarked link or one taken from a trusted location.
Phishing websites can be highly convincing

How to spot phishing websites

The most effective method for spotting a phishing website is to analyze the URL and specifically look for the primary domain and determine if it matches what’s expected. For example, attacker.com is the primary domain inside the following URL: https://microsoft.attacker.com/security?query=valid

Is the following statement True or False:
The most effective method for spotting a phishing website is to look at the primary domain and determine if it matches what’s expected.

View Options Again

Your account is your digital identity

Beyond being able to spot phishing websites, it’s important to protect your digital identity by following good cyber security hygiene practices. Let’s explore this in more detail.

Protecting your devices

To protect your devices, you should: Keep your computer up to date with security patches. Use strong, unique passwords for all of your accounts. Use multi-factor authentication. Last but not least, keep antivirus software up-to-date.

Which of the following is NOT a way to protect your devices?

View Options Again

Protecting your data

To protect your data from cybercriminals, you should:
It's good to encrypt your data because it adds an extra layer of protection against cybercriminals. Encryption is a method of encoding data so that it can only be accessed by someone with the proper decryption key. This means that even if your data falls into the wrong hands, it will be much harder for an attacker to access it.
It's good to back up your data because it provides a way to restore your data in the event of a cyberattack, hardware failure, or other data loss event. By regularly backing up your data, you can ensure that you have a copy of your important files and information that you can access in the event of a disaster.
It's good to use unique passwords when securing data because it helps make it more difficult for an attacker to gain access to all of your accounts and data. Even if an attacker finds your password in a breach or password dump, they will only have limited access to your online identity.

What's the BEST method to protect your data from cyber attacks?

View Options Again

Wrapping Up

By following the practices outlined in this training, you can keep your clients safe and your reputation spotless.