Toggle menu

Cyber security for Legal

Regardless of specialisation, legal firms store vast quantities of sensitive data. From personally identifiable information (PII), to contract and banking details, through to witness statements, the information critical to your cases will be of interest to professional thieves.

But as hacking attacks become more sophisticated, many legal firms are struggling to stay ahead of the criminals. Organised criminal gangs are targeting legal firms to acquire vital information they can use as a springboard against other organisations like banks.

Regular penetration testing and security audits will help to protect your clients and business against these threats. By partnering with Fidus we can help you identify and manage vulnerabilities including:
• Penetration testing to reveal weaknesses in security systems.
• Security and permissions audits that uncover exploitable misconfigurations.
• Physical security assessments to check protection of your office and data centre.
• Social engineering tests to ensure your staff are ready to head of person-to-person attacks.
• Phishing email testing to check malware-infected emails are dealt with safely.
• Full red team cyberattack simulation to test how your legal would manage a co-ordinated cyberattack.
• Cyberattack response readiness check to confirm you ready to deal with all eventualities.

At the end of every test our consultants will supply you with a plain English report. In it we detail our findings and recommendations for improving IT security. And we’re always happy to help implement those suggestions.

Cyber security compliance for Legal

The entire legal industry rests on trust in the relationship between attorney and client. Most of the “regulatory” work you do will be to strengthen that connection with your clients.

For those firms dealing with private citizens, there is the small matter of GDPR to deal with. The regulation gives EU citizens a raft of rights about how their data is handled and what they can expects from firms, like yours, who collect and store it.

Breaching GDPR could be a costly mistake, attracting fines of up to €20 million. Fidus can help you avoid these penalties by improving compliance. Our consultants can conduct a GDPR audit to help you understand the personal data you collect, where it is stored, and how well it is protected.

The GDPR audit can be used to build an action plan of the steps needed to achieve full compliance with the regulation. And Fidus consultants are always on hand to help you make the required changes.

Ready to learn more?

Get in Touch

Fidus Security Solutions

Penetration Testing

Let Fidus work with you to ascertain your overall security posture.

Public Sector

Are you a public sector body? Have a look how we can help.

Compliance

Worried about compliance? Look no further.

Why Fidus?

Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.

Remedial Support

More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.

Certified Security Consultants

Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP

Easy to Understand Reports

We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.

Fixed Price Proposals

The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.

The Industry Average

Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.

The Fidus Way

Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.

Trusted by

Get in Touch with Fidus Information Security

Frequently Asked Questions

What software do you use?

Penetration Testing ‘tools’ are used as part of engagements to help assess, identify and exploit commonly found vulnerabilities. There are numerous different kinds of tools used within every engagement, each with a different use and varying popularity – like most things, people have a preference!

Whilst these tools are effective at finding what they’re able to, it’s important to ensure your provider does not simply run automated tools and issue a report. Many vulnerabilities cannot be identified simply by running an automated tool without some form of manual verification and, in some cases, manual exploitation too. Our consultants at Fidus focus on manual testing where possible and whilst some of these tools are used to aid assessments, they will never be the focal point of the engagement.

Commonly seen tools include; NMap, Metapsloit, SQLMap, Nessus, Qualys, Nikto, SSLScan, Cobalt Strike and many, many more.

What is the goal of a penetration test?

The end goal of a Pen Test varies from client to client and has many underlying factors, such as; complexity of application and/or network, whether there have been previous tests, what kind of data the application/network holds and the size of the organisation.

The most frequent goal we are given by clients is “Can you obtain our customer information?”. However, it is also important to not overlook other issues which could lead to things such as loss of business reputation if the customer facing website is compromised.

Do i pass/fail?

Penetration Testing should NOT become a Pass/Fail assessment for your organisation It should be seen as an exercise to evaluate your current security posture with the aim to make as many improvements as possible.

At Fidus, we ensure the client is able to extract as much value from the assessment as possible. As such, our reports contain sections for both the executive team which is aimed at the risks to the business and a technical section for the development and IT teams. We provide enough information for the C-Level staff members to fully understand the report and enough information for the technical team to be able to locate, reproduce and fix all issues discovered.

What are the stages of a pen test?
  • Initiation / Scoping – Ensuring the delivery of work is exactly as you require and the correct amount of time is allocated to your engagement.
  • Pre-Assessment – Confirmation that your environment is accessible and ready for testing and all requirements have been completed.
  • Assessment – Conducting the engagement as per the Scope of Work.
  • Post-Assessment – Collection of all results and ensuring the tested environment has been tidied up where possible.
  • Reporting – Compilation of results for final deliverable.
  • Remediation Discussion and Support – Discussion and explanation of all issues where required and further support for implementing changes as recommended within the deliverable.
How long does an assessment take?

The time it takes to conduct each assessment is dependent on the scope of the engagement. There are multiple factors which can impact the length of the engagement, such as; network size, complexity of applications, size of organisation and whether the assessment is internal or external.

What are the benefits?

The main benefit of is the proactive approach to finding serious vulnerabilities before attackers do. These vulnerabilities can lead to numerous scenarios such as; reputational damage, loss of user data and financial fines.

Compliance

Penetration Testing is also a key factor to becoming compliant in multiple standards, such as Cyber Essentials Plus, PCI DSS and ISO 27001.

Evaluate Current Security Controls

A pen test allows you to evaluate current security controls which are in place. These could be Intrusion Prevention Systems (IDS), Intrusion Protection Systems (IPS), Firewalls and Web Application Firewalls (WAF). We commonly see mis-configuration of these devices, sometimes rendering them ineffective at their main job, keeping your data safe.

Avoid The Cost of Network Downtime

Have you ever worked out how much it would cost your business if you had even a day downtime because of a cyber attack? This is not simply the loss of a day wages for all employees, it may also include; legal fees, incident response, customer protection and damage control activities.

A security assessment also allows you to establish the level of exposure if a specific area of your company gets breached, such as the main user web application, and ascertain how sensitive the data held within is. Currently, sensitive breaches must be reported to the Information Commissioner’s Office (ICO) with fines sometimes reaching 6 figures. However, with the upcoming General Data Protection Regulation (GDPR) law, these fines are set to multiply and only give organisations 72 hours to discover and report a breach. The easiest way to avoid a breach is to proactively defend against one.

How often should we conduct a penetration test?

Penetration Testing should be performed on a regular basis to ensure newly discovered threats and previously recommended implementations are evaluated. In addition to this, penetration testing should occur when there’s a big change to network infrastructure, a new web application is deployed, during/before mergers and Phishing assessments should take place upon expansion of your team.

What kind of test do i require?

The kind of assessment you require has many underlying factors. Some questions such as “We’re about to deploy a new web application, what kind of testing do you recommend?” are much easier to answer than “We’ve never had a Penetration Test before, what do you recommend?”.

For the latter question, there are a series of questions which need to be answered first. Such as; What are your key assets? What would cripple your business if stolen? (Signing keys, source code, customer data etc), How many employees do you have? What is your budget?

It is important to have all of the information to be able to evaluate what would have the best return on investment for your Penetration Test.

If you would like to talk through the different kind of paths you could take, please get in touch.

Request a Call Back

Would you like to speak to us over the phone? Just submit your details and we’ll be in touch shortly. You can also email us if you would prefer – [email protected]

I would like to discuss:

All fields are required

“Oysta is very happy with the support, service and dedication of the Fidus team. Working with the Oysta team every step of the way, not only did they check all security on the device, they also provided feedback on the quality of the hardware. I will be working with Fidus again.”

Mario Zuccaro, Founder and CEO, Oysta Technology

June 2019

“We have been really pleased with the service provided by Fidus. We have found them to be extremely easy to work with. We also felt their fee structure was reasonable. We would recommend Fidus to anyone looking for a PCI pen testing partner.”

Andy Phillips, Inspired Outsourcing

May 2019

“Great service. Gave us exactly what we needed, as promised.”

Philip Cunnington, TalkPlus NHS

January 2019

“We were extremely pleased with the service, knowledge and professionalism shown by Fidus. After the remediation phase, we then ran a phishing exercise with them to remind staff of the need to be vigilant with external email communications. I would have no hesitation in using or recommending Fidus in the future due to the quality of work carried out at a great price.”

Graeme Thistlethwaite, ICT, Business Change and Business Support Manager

“Fidus provided a high quality penetration service at a reasonable price … communications were great … the Pen test team flexed around us and our other commitments to get the job done. Thanks!”

Darren Crombie, CEO, Upstream Outcomes

October 2018

/