Skip to content
Law Society of Scotland
Search
Find a Solicitor
Contact us
About us
Sign in
Search
Find a Solicitor
Contact us
About us
Sign in
  • For members

    • For members

    • CPD & Training

    • Membership and fees

    • Rules and guidance

    • Regulation and compliance

    • Journal

    • Business support

    • Career growth

    • Member benefits

    • Professional support

    • Lawscot Wellbeing

    • Lawscot Sustainability

  • News and events

    • News and events

    • Law Society news

    • Blogs & opinions

    • CPD & Training

    • Events

  • Qualifying and education

    • Qualifying and education

    • Qualifying as a Scottish solicitor

    • Career support and advice

    • Our work with schools

    • Lawscot Foundation

    • Funding your education

    • Social mobility

  • Research and policy

    • Research and policy

    • Research

    • Influencing the law and policy

    • Equality and diversity

    • Our international work

    • Legal Services Review

    • Meet the Policy team

  • For the public

    • For the public

    • What solicitors can do for you

    • Making a complaint

    • Client protection

    • Find a Solicitor

    • Frequently asked questions

    • Your Scottish solicitor

  • About us

    • About us

    • Contact us

    • Who we are

    • Our strategy, reports and plans

    • Help and advice

    • Our standards

    • Work with us

    • Our logo and branding

    • Equality and diversity

  1. Home
  2. For members
  3. Business support
  4. Technology
  5. Cybersecurity guide
  6. Risk areas

Risk areas to consider

Computers and IT systems

A firm's computers, servers, storage, phones and network are all vulnerable to cyberattacks. Issues occur when the network has not been properly secured and the security settings on device are not configured correctly.  

Your staff and contractors

Without proper training staff can be your most significant vulnerability. Cybercriminals will exploit staff who do not think before clicking on weblinks, email attachments and even social media videos. Passwords in the workplace may be weak, re-used and shared as staff prioritise convenience over security. Insider threat from unhappy staff is also an issue if policies and procedures are not effective.

Personal mobile phones and devices

Personal devices such as phones, tablets and laptops are increasingly used for work purposes, especially for the mobile workforce. These are easier to attack than corporate IT equipment, which often has more restrictions and protections. Personal mobile phones may be allowed to connect to the office Wi-Fi, which can provide cybercriminals with access to critical data and information.

Cloud portals and platforms

It is increasingly common for law firms to use cloud portals and platforms provided by third-party software suppliers for document management and practice management. This can become an exploitable vulnerability if supplier due diligence is not thorough and security configuration is not applied and maintained.

Remote and home working

Staff working remotely, when travelling or at home, are more inclined to make compromises on security by using personal email accounts, insecure connections, personal social media accounts and browsing unrestricted websites.

Data transfer and storage

Transferring data as an email attachment creates an exposure risk and relaxed access management rules mean that personal data is easily found on networks. Firms may unconsciously allow staff to use cloud services to transfer information. Dropbox, Gmail, and Hotmail, for example, are cloud services that employees may use to transfer information.

A firm's public website

Your public-facing website is often a target for cybercrime. Examples of breaches include a denial of service attack, which takes the site down completely; a hack into systems that sit behind the website, such as customer databases; and, the insertion of spyware to intercept customer information.

Client accounts and cashroom

Any area of a business that handles money and bank details is a target for cybercriminals.

Add To Favorites

Additional

  • Cybersecurity guide

In this section

  • Risk areas
  • The threats
  • The consequences of a cybersecurity breach
  • Solutions
  • Notification requirements and incident response
  • Responding to a cyber incident
  • Hot topics
  • Cyber Essentials

Mitigo

Our cyber security partner

Find out more about Mitigo
Law Society of Scotland
Atria One, 144 Morrison Street
Edinburgh
EH3 8EX
If you’re looking for a solicitor, visit FindaSolicitor.scot
T: +44(0) 131 226 7411
E: lawscot@lawscot.org.uk
About us
  • Contact us
  • Who we are
  • Strategy reports plans
  • Help and advice
  • Our standards
  • Work with us
Useful links
  • Find a Solicitor
  • Sign in
  • CPD & Training
  • Rules and guidance
  • Website terms and conditions
Law Society of Scotland | © 2025
Made by Gecko Agency Limited