Assumes Facts Not In Evidence

In the latest paper by Countercept we examine how cyber security in law firms is misunderstood - and what can be done about it.

Cyber attack detection in law firms is often misunderstood. As a consequence, security budgets are frequently misspent.

A key reason for this is the series of false assumptions that have become endemic in law firms’ approach to cyber security.

First, despite a media backdrop of breaches and compromises, not all law firms are a target for attack; it depends on whether the firm offers sufficient motivation to threat actors. We look at how a law firm can assess its current risk from state sponsored attacks; from criminals seeking financial gain; and from hacktivists.

Secondly, effective safeguards can only be implemented when the nature of the attack is properly understood. This in turn requires an understanding of the threat actor’s motivations; the result they seek; and their ability to carry out the attack. We look at the ways in which law firms are targeted by the various types of threat actor – and what can be done to mitigate the firm’s particular risks.

Some of the key points examined in the paper:

  • Selecting ‘lightweight’ security controls that are effective without adversely impacting the business process.
  • Understanding that as the firm acquires new clients, in new areas of business, the threats facing the law firm can radically change, and hence the security strategy needs to evolve alongside the business strategy.
  • Invoking economies of scale in terms of cost and capability.
  • Avoiding the trap of relying on assurance and compliance-led controls (which might be useful business-enablers but are potentially irrelevant to the real-world threat).
  • Using SRA guidelines to support the decision-making process.

Simply fill in the form on this page to download the latest paper from Countercept by MWR.

Download resource


Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.