Human Error and Insiders Expose Millions in UK Law Firm Data Breaches

UK law firms are falling victim to data breaches primarily because of insiders and human error, according to an analysis of data from the the Information Commissioner's Office.
NetDocuments examined data from the ICO covering Q3 2022 to Q2 2023 and found that 60% of data breaches in the UK legal sector were the result of insider actions, the rest were from external actors.
In total, NetDocuments found that data from legal firms relating to 4.2 million people was compromised during the period analyzed.
Almost half of the cases impacted customers and 13% impacted employees.
Sharing data with the wrong person occurred in 37% of incidents Phishing and ransomware attacks were responsible for 27% of attacks.
Although the firm has not confirmed cause of the incident, one user on X posted a screenshot appearing to show the firm's listing on the leak site of prolific ransomware-as-a-service group LockBit.
In November 2021, the UK's largest conveyancing firm Simplify Group was the victim of a major cyber-attack that led to core business systems being taken offline.
This was reported to have cost the firm £6.8m in business.
The firm is said to have invested heavily to increase its cybersecurity resilience following the incident.
In 2023, the National Cyber Security Centre issued guidance and steps for legal firms to take to combat evolving cyber threats.
In the Cyber Threat Report: UK Legal Sector, the NCSC warned how the widespread adoption of hybrid working has increased the risks online.
It also highlighted how sensitive information and the sums of money firms often handle can make them particularly attractive targets to attackers.


This Cyber News was published on www.infosecurity-magazine.com. Publication date: Fri, 12 Jan 2024 09:30:21 +0000


Cyber News related to Human Error and Insiders Expose Millions in UK Law Firm Data Breaches

Law Firms and Legal Departments Get Singled Out For Cyberattacks - Cyberattackers are doubling down on their attacks against law firms and corporate legal departments, moving beyond their historical activity of hacking and leaking secrets to targeting the sector with financial attacks, such as ransomware and ...
2 years ago Darkreading.com LockBit
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
Law Firms are Raising the Bar on Cybersecurity - Corresponding with recent increases in threat actor activity in the legal industry, law firms are investing more time and attention in modernizing security operations. Both midsize and large law firms are increasingly engaging with cybersecurity ...
2 years ago Bluevoyant.com
Human Error and Insiders Expose Millions in UK Law Firm Data Breaches - UK law firms are falling victim to data breaches primarily because of insiders and human error, according to an analysis of data from the the Information Commissioner's Office. NetDocuments examined data from the ICO covering Q3 2022 to Q2 2023 and ...
2 years ago Infosecurity-magazine.com LockBit
Critical insights into Australia's supply chain risk landscape - Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as ...
1 year ago Tripwire.com
How Cybersecurity for Law Firms has Changed - The public nature of the legal system makes law firms particularly vulnerable to a growing number of cybersecurity risks. Law firms have unique access to highly confidential client information and as a result, face a growing number of federal, ...
2 years ago Securityboulevard.com
The law enforcement operations targeting cybercrime in 2023 - In 2023, we saw numerous law enforcement operations targeting cybercrime operations, including cryptocurrency scams, phishing attacks, credential theft, malware development, and ransomware attacks. While some of these operations were more successful ...
2 years ago Bleepingcomputer.com
Victory! Grand Jury Finds Sacramento Cops Illegally Shared Driver Data - For the past year, EFF has been sounding the alarm about police in California illegally sharing drivers' location data with anti-abortion states, putting abortion seekers and providers at risk of prosecution. We thus applaud the Sacramento County ...
1 year ago Eff.org
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
States Attack Young People's Constitutional Right to Use Social Media: 2023 Year in Review - Legislatures in more than half of the country targeted young people's use of social media this year, with many of the proposals blocking adults' ability to access the same sites. Courts blocked several of these laws for violating the First ...
2 years ago Eff.org
Data Breaches in US Schools Exposed 37.6M Records - Since 2005, educational institutions in the United States have experienced 3713 data breaches, impacting over 37.6m records. According to new data by Comparitech, 2023 marked a record year, with 954 breaches recorded - a dramatic rise from 139 in ...
1 year ago Infosecurity-magazine.com
Localization Mandates, AI Regs to Pose Major Data Challenges in 2024 - Companies should expect to face a trio of trends in 2024 that make data security, protection, and compliance more critical to operations and risk reduction. Increasingly, governments worldwide are creating laws that govern the handling of data within ...
2 years ago Darkreading.com
Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches - An Apple-commissioned report this week has highlighted once again why analysts have long recommended the use of end-to-end encryption to protect sensitive data against theft and misuse. The report is based on an independent study of publicly reported ...
2 years ago Darkreading.com
Post-quantum cryptography: Code-based cryptography - One option is to use error correction codes as a cryptographic primitive. The basics Error correction codes are digital codes used to reliably send data through an unreliable channel. In a noisy channel, corruption of some of the bits would yield an ...
1 year ago Redhat.com
How Can DSPM Prevent High-Profile Breaches? - In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach. On the 5th of December 2023, the company shared that the data breach was more damaging than was initially reported. On ...
2 years ago Gbhackers.com
My Yearly Look Back, a Look Forward and a Warning - 2023 saw cybersecurity and privacy law arrive at a crossroads, especially with regard to the regulatory landscape. This is the time of year when it is traditional to look back at the past year and extrapolate forward to make predictions for the year ...
2 years ago Securityboulevard.com
FCC orders telecom carriers to report PII data breaches within 30 days - Starting March 13th, telecommunications companies must report data breaches impacting customers' personally identifiable information within 30 days, as required by FCC's updated data breach reporting requirements. FCC's final rule follows several ...
1 year ago Bleepingcomputer.com
Hackers Stole Data of 1.3 Million Financial National Fidelity Users - Hackers stole data from more than 1.3 million Fidelity National Financial customers when the giant real estate services firm was hit with a ransomware attack in November 2023 that shut down the company's operations for a week. The company wrote that ...
2 years ago Securityboulevard.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
1 year ago Venturebeat.com
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
2 years ago Securityboulevard.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
2 years ago Securityzap.com
Cybersecurity Compliance: Understanding Regulatory Frameworks - Data breaches continue to increase year over year: there was a 20% increase in data breaches from 2022 to 2023 and globally and there were twice the number of victims in 2023 as compared to 2022. Compliance frameworks vary by industry, region, and ...
1 year ago Offsec.com
Cybersecurity M&A Roundup: 34 Deals Announced in November 2023 - Thirty-four cybersecurity-related merger and acquisition deals were announced in November 2023. Network security firm AMYNA Systems has acquired EPL Advisors, which specializes in strategy consulting, investor relations, fund raising, and early ...
2 years ago Securityweek.com
Biggest Data Security Threats for Businesses: Strategies to Strengthen Your Defense - With cybercriminals continuously evolving their strategies to target sensitive data with sophisticated attacks, data security has become a universal priority-no matter the size of your business. With the right strategies, such as regular security ...
2 years ago Hackread.com
Neural data privacy an emerging issue as California signs protections into law - The lack of federal neural data privacy laws for non-medical use of the data — medical applications are regulated by the Food and Drug Administration and are covered under the Health Insurance Portability and Accountability Act, or HIPAA — means ...
1 year ago Therecord.media