{"id":141931,"date":"2026-01-16T02:00:00","date_gmt":"2026-01-16T10:00:00","guid":{"rendered":"https:\/\/xira.com\/p\/2026\/01\/16\/starting-2026-safely-cybersecurity-best-practices-for-law-firms\/"},"modified":"2026-01-16T02:00:00","modified_gmt":"2026-01-16T10:00:00","slug":"starting-2026-safely-cybersecurity-best-practices-for-law-firms","status":"publish","type":"post","link":"https:\/\/xira.com\/p\/2026\/01\/16\/starting-2026-safely-cybersecurity-best-practices-for-law-firms\/","title":{"rendered":"Starting 2026 Safely: Cybersecurity Best Practices for Law Firms"},"content":{"rendered":"<p>Tech Tips: Ben Schorr explains best practices lawyers can use in 2026 to defend against email scams, malware, credential-stuffing attacks and other cybersecurity threats.<br \/>\nThe post Starting 2026 Safely: Cybersecurity Best Practices for Law Firms appeared first on Articles, Tips and Tech for Law Firms and Lawyers.<\/p>\n<p><strong><em>Protect your practice with these essential 2026 cybersecurity best practices for law firms.<\/em><\/strong><\/p>\n<p>Cybersecurity can\u2019t solve every problem, but it can help you protect your clients and your reputation. With sensitive client data at stake and ethical obligations to uphold, it\u2019s essential to follow these best practices to defend against email scams, malware, and credential thieves.<\/p>\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"495\" src=\"https:\/\/i0.wp.com\/www.attorneyatwork.com\/wp-content\/uploads\/2026\/01\/Tech-Tips-Law-FIrm-Cybersecurity-Best-Practices.jpg?resize=769%2C495&#038;ssl=1\" alt=\"computer lock and password information representing law firm cybersecurity best practices\" class=\"wp-image-100048918\" title=\"\"><figcaption><\/figcaption><\/figure>\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\">\n<h2>Table of contents<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-why-cybersecurity-matters-in-legal-practice\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">Why Cybersecurity Matters in Legal Practice<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-phishing-and-email-security\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">Phishing and Email Security<\/a>\n<ul>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-be-reluctant-to-click\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Be reluctant to click.<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-don-t-share-your-credentials-especially-with-strangers\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Don\u2019t share your credentials, especially with strangers.<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-beware-of-malware\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">Beware of Malware<\/a>\n<ul>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-never-click-unexpected-files\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Never click unexpected files.<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-keep-it-clean\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Keep it clean.<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-stay-up-to-date\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Stay up-to-date.<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-keep-your-credentials-secure\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">Keep Your Credentials Secure<\/a>\n<ul>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-use-long-unique-complex-passphrases\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Use long, unique, complex passphrases.<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-store-passwords-in-a-password-manager\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Store passwords in a password manager.<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-use-passkeys-when-possible\" data-level=\"3\" rel=\"nofollow noopener\" target=\"_blank\">Use passkeys when possible.<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-stay-alert-out-there\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">Stay Alert Out There<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/cybersecurity-best-practices-for-law-firms\/#h-more-tech-tips-from-affinity\" data-level=\"2\" rel=\"nofollow noopener\" target=\"_blank\">More Tech Tips From Affinity<\/a><\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\" id=\"h-why-cybersecurity-matters-in-legal-practice\">Why Cybersecurity Matters in Legal Practice<\/h2>\n<p>Lawyers are entrusted with confidential information, making them prime targets for cyberattacks. ABA Model Rule 1.6 requires attorneys to safeguard client data, making cybersecurity not just a technical issue, but an ethical one. I\u2019m guessing I don\u2019t need to go much further with this, as you\u2019ve hopefully been hearing this since law school.<\/p>\n<h3 class=\"wp-block-heading\">The Threat Landscape<\/h3>\n<p>The story goes that famous bank robber Willie Sutton was asked why he robbed banks, and he replied, \u201cBecause that\u2019s where the money is.\u201d (Sutton denied ever saying that, but it\u2019s still a useful parable). As the custodians of their clients\u2019 sensitive and valuable data, law firms are priority targets for modern-day robbers.<\/p>\n<p>Some of the most prominent ways that bad guys target firms are:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Phishing.<\/strong> Deceptive messages designed to steal credentials.<\/li>\n<li><strong>Ransomware.<\/strong> Malicious software that locks data, or threatens to expose it, until a ransom is paid.<\/li>\n<li><strong>Credential theft and credential stuffing attacks.<\/strong> When attackers use stolen passwords to access accounts.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-phishing-and-email-security\">Phishing and Email Security<\/h2>\n<p>Phishing attacks often use urgent language, suspicious links and unexpected attachments. Here\u2019s how to stay safe.<\/p>\n<h3 class=\"wp-block-heading\">Verify sender addresses.<\/h3>\n<p>An email that comes not from \u201cMicrosoft.com\u201d but from \u201cMicrosoft365-support.ru\u201d is suspect. Likewise, a message that claims to be from your client or business partner but was sent from an unrecognized Gmail account should raise an eyebrow. Is that REALLY them?<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-be-reluctant-to-click\">Be reluctant to click.<\/h3>\n<p>When you hover your mouse cursor over a hyperlink, most systems will show you what that link actually goes to, and in many cases, it\u2019s not what the link appears to be. If the URL shown looks even slightly suspicious, don\u2019t click it. And never click links or open files you weren\u2019t expecting. Even if they appear to come from somebody you trust.<\/p>\n<p>If you receive a file or link you weren\u2019t expecting or that seems suspicious, reach out to the person who sent it via a different medium, such as a phone call, text or a new email (not a reply to the suspicious message!) to confirm that the file or link is legitimate.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-don-t-share-your-credentials-especially-with-strangers\">Don\u2019t share your credentials, especially with strangers.<\/h3>\n<p>They\u2019re the keys to your data house and can be quickly misused, with devastating consequences, in the wrong hands. If a stranger, especially one claiming to be from an organization you trust, asks you for your password, that should raise red flags. IT or banking support shouldn\u2019t need you to give them your password, especially not over the phone, text or email.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-beware-of-malware\">Beware of Malware<\/h2>\n<p>Ransomware and other malware usually present as a file that you\u2019re encouraged to open. This may be in an email or text message or as a download from a website. In some cases, malware pretends to be a useful app or game.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-never-click-unexpected-files\">Never click unexpected files.<\/h3>\n<p>Just as with our phishing defense above, don\u2019t click on files or links you weren\u2019t expecting, even if they appear to come from somebody you trust. If you receive a file or link you weren\u2019t expecting or that seems suspicious, reach out to the person who sent it via a different medium, such as a phone call, text or a new email (not a reply to the suspicious message!) to confirm that the file or link is legitimate.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-keep-it-clean\">Keep it clean.<\/h3>\n<p>Be reluctant to install apps or games, especially from unvetted sources. Just because an app may appear in the app store of your device doesn\u2019t mean it\u2019s been carefully vetted. Read the reviews, pay attention to which company makes the app, and only install\/keep apps that you\u2019re actually going to use.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-stay-up-to-date\">Stay up-to-date.<\/h3>\n<p>It\u2019s remarkable how often I see people whose devices have months of pending updates they\u2019ve never bothered to install. Those updates often contain important security fixes that are key to keeping your data protected. Install the updates. The couple of minutes it takes are a lot less painful than having to explain why you got compromised through a vulnerability that the manufacturer had patched months earlier.<\/p>\n<p><strong><mark>Tip:<\/mark><\/strong>Just restarting your device regularly can help keep your updates current.<\/p>\n<h3 class=\"wp-block-heading\">Are your backups current? Are you sure?<\/h3>\n<p>Keep all your key data backed up, ideally in a secure cloud or offline location and be sure to test your backups. Backups are only useful if they\u2019re complete, current and you know how to restore the data if something bad happens.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-keep-your-credentials-secure\">Keep Your Credentials Secure<\/h2>\n<p>Strong, unique passwords and multifactor authentication are your best defenses. Credential attacks go a lot further than simply guessing a bad password. (Hopefully you\u2019re not using \u201cPizza\u201d or \u201cPassword1\u201d as your password anywhere.)<\/p>\n<p>Email addresses are common usernames today, and if you use the same password for your bank account as you do at \u201cgiggleworkstoys.com,\u201d then you may be in trouble. Your bank may have great cybersecurity, but does GiggleWorks Toys? If bad guys break GiggleWorks\u2019 site and find your username and password there, they\u2019ll try that username and password at thousands of other sites across the web, just hoping to get lucky. That\u2019s called a credential stuffing attack.<\/p>\n<p><mark><strong>Warning:<\/strong><\/mark> If you think somebody else might know your password, you need to change that password immediately.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-use-long-unique-complex-passphrases\">Use long, unique, complex passphrases.<\/h3>\n<p>Create passwords that are at least 12 characters long, using a mix of uppercase and lowercase letters, numbers and symbols. Avoid using easily guessed information, such as birthdays or common words, and never reuse passwords across multiple accounts.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-store-passwords-in-a-password-manager\">Store passwords in a password manager.<\/h3>\n<p>A common problem with good passwords is that they can be hard to remember and frustrating to type. As a result, people tend to choose short, simple passwords that are easy to guess or crack. And they use them over and over. A password manager is a piece of software that can remember your long, unique, complex passwords for you.<\/p>\n<p>Modern password managers can also generate random (or nearly random) secure passwords for you, saving you the trouble of having to dream one up yourself.<\/p>\n<h3 class=\"wp-block-heading\">Enable MFA for all accounts.<\/h3>\n<p>Multifactor authentication is probably the single most important thing you can do to secure your accounts. The way MFA works is that when you sign into your account, the system will ask for a second thing \u2014 called a \u201cfactor\u201d \u2014 to help prove that you are who you say you are. There are three kinds of factors:<\/p>\n<ul class=\"wp-block-list\">\n<li>Something you know \u2014 like a password or memorized PIN.<\/li>\n<li>Something you have \u2014 like a USB key or physical device.<\/li>\n<li>Something you are \u2014 like a fingerprint or facial scan.<\/li>\n<\/ul>\n<p>MFA requires not just two steps, but two different factors to be involved. Asking for a password and a memorized PIN, for example, wouldn\u2019t be MFA because that\u2019s not two factors, that\u2019s two of the same factor (something you know).<\/p>\n<p>A bad guy might guess, or trick you into revealing, your password, but they can\u2019t guess your fingerprint. That makes it a lot harder for them to break into your account.<\/p>\n<p>A common objection to using MFA is that it\u2019s a hassle, but a properly configured system won\u2019t actually ask for your second factor very often. In fact, most of them can learn how you commonly sign in \u2014 from your laptop, in your home, during work hours, for example \u2014 and won\u2019t ask for the second factor when the sign-in is typical. But bad guys who steal your password probably aren\u2019t signing into your device in your home \u2014 they\u2019re signing in from their lair in Scamistan. Your system should recognize that\u2019s not typical and demand the second factor \u2026 which they won\u2019t have.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-use-passkeys-when-possible\">Use passkeys when possible.<\/h3>\n<p>Passkeys are a modern way to sign in to your accounts without having to remember or type a password. Instead, when you set up a passkey, your device \u2014 like your phone or computer \u2014 creates a unique digital \u201ckey\u201d for each account. This key is stored safely on your device and works together with the website or app to confirm your identity when you log in.<\/p>\n<p>What makes passkeys different from traditional passwords is that you never actually see or enter the key yourself, and it\u2019s never sent over the internet. Hackers can\u2019t steal your passkey by tricking you with fake websites (a common problem called phishing) or by watching what you type. To use a passkey, you simply approve the sign-in with something simple, like your fingerprint, face recognition or a PIN you set up on your device.<\/p>\n<p>Unlike regular biometrics alone, which just unlock your device, passkeys use your biometric or PIN to approve the use of your unique digital key for logging in to a website or app. This means your fingerprint or face scan isn\u2019t sent anywhere; it just lets your device use the passkey safely.<\/p>\n<p>In short, passkeys combine the convenience of biometrics with stronger security than passwords, making it much easier and safer for you to access your accounts.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-stay-alert-out-there\">Stay Alert Out There<\/h2>\n<p>Cybersecurity can\u2019t solve every problem, but it can help you protect your clients and your reputation. Take action today to strengthen your defenses and stay alert.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<h2 class=\"wp-block-heading\" id=\"h-more-tech-tips-from-affinity\">More Tech Tips From Affinity<\/h2>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.attorneyatwork.com\/microsoft-copilot-for-email-management\/\" rel=\"nofollow noopener\" target=\"_blank\">Cut Through the Clutter: How Copilot Helps You Get a Handle on Your Inbox<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/microsoft-copilot-2025-its-better-1-year-later\/\" rel=\"nofollow noopener\" target=\"_blank\">Microsoft Copilot 2025: It\u2019s Better 1 Year Later<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/legal-ai-myths-separating-fact-from-fiction-in-your-law-firm\/\" rel=\"nofollow noopener\" target=\"_blank\">Legal AI Myths: Separating Fact from Fiction in Your Law Firm<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/law-firm-tech-cleanup-6-steps-to-boost-efficiency-and-cut-costs-now\/\" rel=\"nofollow noopener\" target=\"_blank\">Law Firm Tech Cleanup: 6 Steps to Boost Efficiency\u00a0and Cut Costs\u00a0Now<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/secure-collaboration-tools-and-hacks-every-lawyer-should-know\/\" rel=\"nofollow noopener\" target=\"_blank\">15 Secure Collaboration Hacks Every Lawyer Should Know<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/24-quick-tech-tips-to-try-this-year\/\" rel=\"nofollow noopener\" target=\"_blank\">25 Quick Tech Tips to Try in 2025<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/microsoft-word-speech-to-text\/\" rel=\"nofollow noopener\" target=\"_blank\">6 Ways Microsoft Word Speech-to-Text AI Can Help You Write Faster and Better<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/the-secret-to-quickly-creating-user-friendly-pdf-bookmarks\/\" rel=\"nofollow noopener\" target=\"_blank\">PDF Bookmarks: The Secret to Quickly Creating User-Friendly Documents<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/new-outlook-interface-email-reminders\/\" rel=\"nofollow noopener\" target=\"_blank\">Never Forget to Follow Up: Using Outlook Email Reminders<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/improve-document-drafting-accuracy-with-microsoft-word-templates\/\" rel=\"nofollow noopener\" target=\"_blank\">Templates to Create Model Documents That Save Your Law Firm Tons of Time<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/paperless-law-practice\/\" rel=\"nofollow noopener\" target=\"_blank\">Paperless Law Practice: How to Boost Efficiency, Cut Costs and Improve Client Satisfaction<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/document-automation-tools\/\" rel=\"nofollow noopener\" target=\"_blank\">Take Your Practice to the Next Level With Document Automation Tools<\/a><\/li>\n<li><a href=\"https:\/\/www.attorneyatwork.com\/how-to-master-page-numbers-in-microsoft-word\/\" rel=\"nofollow noopener\" target=\"_blank\">How to Master Page Numbers in MS Word<\/a><\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p class=\"has-small-font-size\">Image \u00a9 iStockPhoto.com. <\/p>\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile has-white-background-color has-background\">\n<figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.attorneyatwork.com\/subscribe\/\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"372\" height=\"106\" src=\"https:\/\/i0.wp.com\/www.attorneyatwork.com\/wp-content\/uploads\/2023\/06\/AttorneyatWork-Logo-%C2%AE-2021-1.jpg?resize=372%2C106&#038;ssl=1\" alt=\"\" class=\"wp-image-100019522 size-aaw-full-width-no-crop\" title=\"\"><\/a><\/figure>\n<div class=\"wp-block-media-text__content\">\n<p><strong>Sign up for Attorney at Work\u2019s daily practice tips newsletter <a href=\"https:\/\/www.attorneyatwork.com\/subscribe\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a> and <a href=\"https:\/\/feeds.transistor.fm\/attorney-at-work-today\" rel=\"nofollow noopener\" target=\"_blank\">subscribe to our podcast<\/a>, Attorney at Work Today.<\/strong><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tech Tips: Ben Schorr explains best practices lawyers can use in 2026 to defend against email scams, malware, credential-stuffing attacks and other cybersecurity threats. The post Starting 2026 Safely: Cybersecurity Best Practices for Law Firms appeared first on Articles, Tips and Tech for Law Firms and Lawyers. Protect your practice with these essential 2026 cybersecurity [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-141931","post","type-post","status-publish","format-standard","hentry","category-legal_matters"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/141931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/comments?post=141931"}],"version-history":[{"count":0,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/141931\/revisions"}],"wp:attachment":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media?parent=141931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/categories?post=141931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/tags?post=141931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}