• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Jun 21 2025

Law Firms in the Crosshairs: Backup Attacks, SOC Upgrades & New Legal Cyber Risks

cybersecurity for law firms

From ransomware targeting law firm backups to the legal fallout of delayed breach disclosures, this edition of our newsletter covers the evolving threats facing the legal sector and what your firm must do to stay protected.


Boston Law Firm Faces Twin Class Actions Over Data Breach

A cybersecurity breach at a Boston-based law firm has triggered two class action lawsuits, highlighting growing legal exposure for firms that fall short on data protection.

The lawsuits allege that Casner & Edwards, a well-established firm, failed to secure sensitive client data, resulting in a breach that compromised the personally identifiable information (PII) of nearly 13,000 individuals. 

While the breach occurred in March 2024, affected individuals weren’t notified until more than a year later, prompting claims of negligence and delayed disclosure.

The complaints, filed in May and June 2025, argue that the firm either ignored or inadequately implemented cybersecurity protocols, putting confidential client data at risk. 

One lawsuit states that Casner “intentionally, willfully, recklessly, or negligently” failed to protect its systems from unauthorized access. Another claims the firm’s delay in notifying affected parties significantly worsened the impact of the breach.

Casner’s leadership has responded, claiming the incident affected only a limited portion of the firm’s network. They also emphasized that the firm engaged law enforcement, launched a detailed investigation, and implemented new security measures. 

Still, the lawsuits move forward, citing negligence, breach of fiduciary duty, and violations of federal law, including the Federal Trade Commission Act.

Why This Matters to Your Firm

Law firms are increasingly prime targets for cybercriminals. 

From confidential client files to sensitive financial transactions, legal practices hold valuable data that hackers are eager to exploit. And while no system is completely breach-proof, how a firm prepares for, detects, and responds to a cyberattack can determine its legal liability.

Legal Risk Is Rising

As of early June, the plaintiffs in both class actions had requested the court to consolidate the lawsuits and appoint interim counsel. The legal claims include:

  • Negligence and negligence per se
  • Breach of implied contract and fiduciary duty
  • Unjust enrichment
  • Violations of the FTC Act

The lawsuits underscore the real-world consequences when firms lack a formal incident response plan, fail to implement cybersecurity best practices, or delay breach notifications. And with courts increasingly sympathetic to plaintiffs in cyber-related litigation, the bar for law firm accountability is rising fast.

Takeaways for Law Firms

This high-profile breach should serve as a wake-up call. Here’s what every law firm should consider immediately:

  • Audit your cybersecurity posture, especially client-facing systems and data storage platforms
  • Implement and regularly test your incident response plan
  • Encrypt sensitive data both in transit and at rest
  • Limit access based on role and need-to-know
  • Establish a breach notification policy aligned with regulatory expectations
  • Engage third-party security experts for vulnerability assessments

___________________________________________________________________________

6-Step Approach to Building a 24/7 SOC for Law Firms

If your current security operations don’t offer 24/7 coverage, your law firm may be one phishing email or zero-day exploit away from disaster.

Here’s a six-step framework to help legal organizations design and implement a resilient, around-the-clock Security Operations Center (SOC) with minimal disruption and maximum protection.

1. Build a Foundation That Aligns With Your Firm’s Risk Profile

Every law firm is different. The size of your client base, the type of matters you handle (e.g., M&A, IP, white-collar defense), and your jurisdictional exposure all shape your risk profile. 

Define the mission and scope of your SOC in direct alignment with these factors and data privacy laws.

  • Do you need to comply with HIPAA, GLBA, or NYDFS?
  • Are you handling international matters subject to GDPR?
  • Are you working with high-net-worth individuals or corporate boards?

Use your answers to justify 24/7 monitoring to senior leadership. 

Also, consider your SOC model:

  • In-house SOCs provide control but require staffing.
  • Hybrid SOCs offer flexibility and scale.
  • Managed SOC services can deliver instant coverage if resources are tight.

AI-powered platforms can stretch your security capabilities further without increasing headcount.

2. Build the Right Security Team And Keep Them Sharp

Staffing a SOC for a law firm means more than hiring analysts. You need professionals who understand the regulatory, ethical, and reputational stakes of a breach in the legal sector.

SOC structures typically include:

  • Tier 1: Monitors alerts and triages incidents.
  • Tier 2: Investigates and remediates threats.
  • Tier 3: Performs threat hunting and strategic planning.

Can’t build all tiers internally? Outsource strategically or consolidate into a two-tier model with clear escalation protocols.

Train your staff on legal-specific threats like BEC scams impersonating managing partners, spear phishing targeting clients, and ransomware campaigns exploiting outdated case management software. 

Encourage certifications (e.g., GCIA, CISSP) and internal learning paths.

3. Avoid Analyst Burnout With Smarter Shift Design

Cybersecurity burnout is real and a serious liability. If your analysts are exhausted, mistakes happen. Threats get missed. Data gets compromised.

Avoid this with smart shift design:

  • Use 8- or 12-hour rotations with built-in recovery days.
  • Adopt a “follow-the-sun” model if you have global offices.
  • Maintain a bench of analysts for flexibility.

Also, rotate responsibilities. Let staff switch between triage, threat hunting, and playbook development to stay engaged.

4. Choose Legal-Grade Security Tools

Don’t just buy what’s trending. Instead, choose what actually works for your legal environment.

Many traditional tools (SIEMs, SOARs, EDRs) were built for enterprise IT, not law firms. They often require massive log storage budgets, constant tuning, and extensive configuration.

What you need are tools that:

  • Integrate with case management and document systems
  • Provide visibility into lateral movement and email compromise
  • Detect unauthorized access to privileged files
  • Support regulatory audit trails

5. Build a Culture of Continuous Learning and Threat Readiness

A reactive SOC is a vulnerable SOC. You need to be proactive.

Foster a security-first mindset by promoting continuous learning, open communication, and hands-on training across your entire team:

  • Hold monthly threat briefings with legal and IT staff.
  • Run tabletop exercises with attorneys and partners.
  • Involve your public relations, legal, and compliance teams in cybersecurity simulation exercises to ensure a coordinated, organization-wide response during a real incident.
  • Conduct post-incident reviews without blame—only learning.

6. Govern With Metrics, Not Guesswork

You can’t manage what you don’t measure. Set specific, measurable benchmarks to evaluate the effectiveness and responsiveness of your 24/7 Security Operations Center.

  • MTTD (Mean Time to Detect)
  • MTTR (Mean Time to Respond)
  • False positive rates
  • AI decision accuracy
  • Analyst workload balance

Track metrics over time. Use real-time dashboards for daily situational awareness and run monthly deep dives to optimize workflows.

Infoguard Cybersecurity helps law firms build, operate, and optimize modern security operations centers tailored to the legal sector. From hybrid SOC design to managed detection and response, we secure what matters most: your clients’ trust and your firm’s reputation.


Ransomware Now Targets Your Backups First 

Threat actors no longer go straight for your case files or email servers. They target something far more devastating first: your backups. Why? Because if they destroy your recovery options, your only path forward may be to pay.

For law firms, this shift changes everything. Backups are often the last line of defense between a crippling breach and business continuity. And if those backups live in the same ecosystem as your production systems or if they’re accessible through compromised accounts, you may already be more exposed than you think.

Attackers understand how the legal industry operates. They know law firms handle sensitive litigation records, financial details, client communications, and privileged data. That’s high-value leverage.

Modern ransomware groups now go after backups first, before deploying encryption across your network. Their playbook includes:

  • Deleting snapshots or changing retention policies to eliminate recovery points
  • Exploiting known vulnerabilities in backup appliances or Windows-based software
  • Gaining access via Active Directory or credential theft to disable backup agents
  • Encrypting backup volumes accessible via the network
  • Attacking cloud backups by breaching the same platform they’re stored on

Common Backup Mistakes in Law Firm Environments

Legal organizations are especially prone to a few backup missteps that make recovery impossible after a ransomware event:

  • Keeping local backups on the same network as production systems
  • Failing to use immutable (write-once, read-many) storage
  • Relying on one cloud provider for both active data and backups (e.g., Microsoft 365)
  • Storing credentials or access tokens in the same environment being backed up

When attackers access your environment, they can use lateral movement to disable both production systems and backups in one coordinated strike.

The 3-2-1-1-0 Strategy — Built for Modern Threats

Law firms must move beyond the outdated 3-2-1 backup rule and implement the more robust 3-2-1-1-0 strategy, an approach designed to meet the demands of legal confidentiality, regulatory requirements, and the high stakes of fiduciary responsibility.

✔️ 3: Maintain three copies of your data

That includes one in production and two backups. For critical case files and email data, use image-based backups that capture full systems, not just files.

✔️ 2: Use two different media types

Store one backup on local disk (preferably with isolated access) and another on secure cloud infrastructure.

✔️ 1: Keep one offsite copy

Physically or logically separate it. In a law firm context, this protects against ransomware and on-site incidents like natural disasters or insider sabotage.

✔️ 1: Have one immutable backup

This version can’t be altered, encrypted, or deleted even by someone with administrative access. It’s your bulletproof restore point.

✔️ 0: Zero backup errors

Regularly test your backups and validate recovery workflows. Ask yourself: Can you get critical systems online within hours after an incident?

Key Backup Security Best Practices for Law Firms

Here’s how your firm can harden both on-premise and cloud-based backups:

On-prem security:

  • Segment backup servers into a separate, secure LAN
  • Apply least privilege access—no broad admin rights for general accounts
  • Use firewalls and port-level controls to prevent unauthorized access
  • Require multifactor authentication (MFA) for all backup logins
  • Encrypt backups with unique keys and passphrases

Cloud backup security:

  • Store backups in a separate cloud environment with its own identity system
  • Avoid production-stored credentials or tokens
  • Use private cloud backup platforms over shared tenant solutions
  • Monitor for unauthorized retention policy changes or agent removal

Whether you’re navigating class-action exposure or building out a 24/7 SOC, one thing is clear: your cybersecurity strategy must evolve faster than the threats. The cost of waiting? Client trust, confidential data, and your firm’s reputation.

Explore how Infoguard Cybersecurity can help your firm lock down backups, boost SOC performance, and reduce breach exposure. 

Best regards,

The Infoguard Cybersecurity Team

Written by kamran · Categorized: Uncategorized

Primary Sidebar

Recents post

Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

Ransomware groups continue to … [Read More...] about Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

With confidential client … [Read More...] about New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

From ransomware attacks … [Read More...] about Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (29)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted
  • New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks
  • Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved