| 5 minute read

The Top 10 Cyber Gaps We See in Law Firms

checkmarks and cybersecurity warning icons laptop

Why Legal Practices Are Prime Targets – And What You Can Do About It

Law firms and in-house legal departments possess some of the most sensitive and valuable data anywhere – from personally identifiable information (PII) and corporate deal terms to litigation strategies and privileged communications. This makes the legal sector a particularly attractive target for cybercriminals. Yet, across countless engagements, Avalon’s cyber experts continue to see recurring cybersecurity gaps in legal organizations of every size.

Understanding these gaps is essential not just for protecting client data, but for maintaining compliance requirements, avoiding financial loss, and preserving reputation. Below, we unpack the ten most common vulnerabilities we encounter, as well as ways to mitigate these weaknesses.

1) Incomplete Asset Inventory

One of the most common – and most overlooked – cybersecurity gaps we see in law firms is the lack of a complete, current inventory of assets (devices, hardware, etc.), software, and data. When organizations don’t have full visibility into what exists in their environment, critical assets can fall outside security monitoring altogether.

Mitigation: Actively inventory and track all enterprise assets, software, and data to know – with a high degree of accuracy – what needs to be monitored and protected within the enterprise based on classification. This will also support identifying unauthorized and unmanaged assets and software to remove or remediate.

2) Unsecured Configurations

Many law firms run critical systems with default or inconsistent settings that are designed for convenience, not security. This can leave unnecessary features turned on and unused accounts exposed. Without approved, centrally managed security settings, based on industry and vendor best practices, small misconfigurations can accumulate over time and create hidden weaknesses. These gaps make it easier for attackers to gain access – often without advanced techniques – and can weaken even well-intentioned security programs.

Mitigation: Firms should establish and maintain approved secure configuration baselines for all assets and systems, aligned with industry benchmarks and vendor best practices. Default accounts, unnecessary services, and insecure settings must be disabled to reduce attack surface. Secure configurations should be centrally managed, reviewed periodically, and updated to address emerging risks and system changes.

3) Outdated software and patch management failures

One of the most persistent cyber gaps we observe is reliance on outdated software and unpatched systems. Legacy case management platforms, unsupported operating systems, and neglected applications become entry points for attackers, who can exploit known vulnerabilities with publicly available tools. Modern attacks don't require zero-day exploits – they rely on failures in basic security hygiene and operational effectiveness. For example, a significant number of firms still depend on software no longer supported by vendors, meaning critical security patches are never applied.

Mitigation: Unpatched software is one of the most common initial access vectors for ransomware and data breaches. Regular patching should be considered as fundamental as locking your office door. Automate patch management wherever possible and institute monthly (or more frequent) checks for support lifecycles on all software components.

4) Weak password policies and lack of multifactor authentication

Weak or reused passwords remain a straightforward way for attackers to gain unauthorized access. Despite the availability of strong password managers and multifactor authentication (MFA) tools, many legal teams still rely on static, single-factor logins, especially for email, document repositories, and remote access services. In fact, industry surveys suggest that a large majority of firms do not consistently enforce two-factor authentication, leaving login credentials exposed even when basic password complexity is required.

Mitigation: Implement organization-wide MFA, integrate password vaulting solutions, and ensure that passwords meet complexity policies. Brute force and credential stuffing attacks thrive where MFA isn’t enforced. With today’s computing power and readily available attack tools, weak or poorly protected passwords can be cracked quickly – making single-factor authentication a significant risk.

5) Inadequate employee training and awareness

People are the weakest link in the cybersecurity chain. Phishing, where attackers deceive employees into revealing credentials or executing malicious code, remains the top attack vector against law firms. Law professionals often operate under intense deadlines and may inadvertently open harmful attachments or click deceptive links because they’re working so quickly. Compounding this, formalized cybersecurity training — especially ongoing, interactive programs – is inconsistent or absent at many firms.

Mitigation: Human error remains a root cause in a majority of successful intrusions. Training raises awareness, improves vigilance, and reduces risk. Deploy quarterly phishing simulations, role-specific cybersecurity training, and targeted reinforcement for high-risk roles (e.g., partners with broad access).

6) Remote workforce security gaps

Remote and hybrid work models are now standard in legal practice, but without strict controls, they can introduce substantial risk. Common remote security gaps include:

  • Use of personal devices without endpoint protection
  • Access from public or unsecured Wi-Fi
  • Lack of VPN or secure remote gateways

Mitigation: Firms that don’t enforce secure remote access protocols leave confidential email, legal documents, and client matter data open to interception or theft. Enforce firm-owned devices with full disk encryption, mandate VPN or zero-trust network access for all remote connections, and block unsecured Wi-Fi without strong controls.

7) Insufficient data backups and disaster recovery

Data backup practices are often overlooked until a crisis hits. Many law firms still fail to adopt immutable backups – copies of data that cannot be modified or deleted even by ransomware. Without reliable backups, a single attack or system failure can result in prolonged downtime, lost client data, and significant financial and reputational damage.

Mitigation: Lacking reliable backups increases the impact of ransomware and system failures, leading to extended downtime, legal exposure, and lost productivity. Implement a 3-2-1 backup strategy (three copies of data, on two separate media, one off-site), and invest in immutable, regularly tested backups.

8) Absence of incident response (IR) planning

Perhaps the most under-appreciated gap we see is the lack of structured incident response readiness. Data shows that only about 34% of law firms report having a formal incident response plan, with some numbers even lower depending on firm size. If there isn’t a plan in place, your team may scramble during a cyber incident, increasing the likelihood of mistakes, miscommunication, and regulatory or client compliance issues.

Mitigation: An incident response plan isn’t just about technology; it orchestrates legal, communications, operational, forensic, and client notification steps. Without one, firms lose valuable time, and make missteps that amplify damage and cost. Develop a documented incident response plan, test it regularly with tabletop exercises, and align it with state breach notification laws and ethical requirements.

9) Third-party and vendor risk

Law firms increasingly rely on outside vendors: cloud vendors, document management systems, eDiscovery platforms, and co-counsel networks. Each new connection introduces additional attack surface if not properly governed. Even trusted vendors can become a pathway for breaches if their security controls are weak or misaligned with your firm’s standards.

Mitigation: Many firms lack formal vendor risk management policies, meaning that partners and providers with weak security practices can inadvertently expose sensitive data. Establish vendor due diligence practices for new and current partners, require contractual security controls, and monitor third-party access to firm systems.

10) Sensitive data storage and encryption shortfalls

Even when systems are secure, poor data storage practices – such as storing PII or privileged documents on unsecured devices, shared drives, or unencrypted cloud environments – multiply risk. Weak or inconsistent encryption and storage controls make it easier for attackers or accidental disclosures to compromise sensitive information.

Mitigation: Less than half of firms fully encrypt all sensitive data both at rest and in transit. Encryption is a cornerstone of confidentiality and, for law firms, often an ethical obligation. Encrypt all sensitive data repositories and communication channels and ensure appropriate key management practices.

Cyber threats to the legal sector aren’t hypothetical – they’re pervasive and growing. The good news? Most of these common gaps can be closed with disciplined planning, investment in modern security controls, and ongoing education. For law firms and in-house teams, cybersecurity isn’t just an IT checklist – it’s a strategic imperative for protecting clients’ data, maintaining trust, and ensuring the future of your practice.

If you’re evaluating your firm’s security posture and want help identifying blind spots, as well as a roadmap of how to fix them, Avalon’s cyber experts are here to support you with tailored assessments, guidance, and ongoing partnership.

Blog Articles

The Top 10 Cyber Gaps We See in Law Firms

Why Legal Practices Are Prime Targets – And What You Can Do About It

Law firms and in-house legal departments possess some of the most sensitive and valuable data anywhere – from personally identifiable information (PII) and corporate deal terms to litigation strategies and privileged communications. This makes the legal sector a particularly attractive target for cybercriminals. Yet, across countless engagements, Avalon’s cyber experts continue to see recurring cybersecurity gaps in legal organizations of every size.

Employee Spotlight: Sarah Faherty

Every once in a while, we like to show off one of our hard-working, detail-oriented problem solvers. Take a moment to see who's in the spotlight today!

Beyond Keywords: The Rise of Conceptual Analytics in eDiscovery

In the world of litigation and internal investigations, legal teams have long relied on keyword search as the cornerstone of document review. But as the volume, velocity, and variety of electronically stored information (ESI) continue to explode, keyword-centric workflows are showing their limits.