"We got into your trust account in 2 hours."
The managing partner's face shifted through several expressions — disbelief, concern, and finally something like relief that this was a test rather than an actual attack.
The penetration test we'd just completed for his firm revealed what many law firm security assessments reveal: the gap between security policy and security reality.
On paper, the firm had reasonable controls. Antivirus on all workstations. Firewall protecting the network. A password policy requiring complexity. Cyber insurance in place.
In practice, a straightforward phishing attack, combined with credential reuse and missing multi-factor authentication, created a path from external attacker to trust account access in just over two hours.
This is why penetration testing matters.
What Penetration Testing Actually Is
Penetration testing — often shortened to "pen testing" — is a controlled attempt to breach an organisation's security defences.
Unlike vulnerability scanning (which identifies known weaknesses automatically) or security audits (which assess compliance with policies), penetration testing simulates real attacker behaviour. It answers the question: "If someone wanted to break in, could they? And if so, how?"
Penetration testers — sometimes called ethical hackers — use the same techniques, tools, and approaches that malicious attackers use. The difference is authorisation: pen testers have permission to attack, strict rules of engagement, and an obligation to report what they find rather than exploit it.
For law firms, penetration testing typically focuses on:
External Testing
Attacks originating from outside the firm's network — attempting to breach perimeter defences, compromise internet-facing systems, or gain initial access through phishing or other techniques.
Internal Testing
Attacks from inside the network — simulating a compromised employee account, a malicious insider, or an attacker who has already gained initial access. Internal testing reveals how far an attacker could move once inside.
Application Testing
Testing of specific applications — client portals, document management systems, or other web applications — for vulnerabilities that could allow data access or account compromise.
Social Engineering
Testing human defences — phishing emails, phone pretexting, or physical access attempts — to assess how staff respond to manipulation attempts.
Why Law Firms Need Pen Testing
Law firms present specific characteristics that make penetration testing particularly valuable.
High-Value Targets
Law firms hold confidential client information across multiple matters — commercial negotiations, M&A transactions, litigation strategy, personal information, financial data. This concentration makes firms attractive targets.
Penetration testing reveals whether the security controls protecting this information actually work.
Trust Account Risk
Law firm trust accounts are prime targets for business email compromise and fraud. Attackers who gain access to firm email systems can insert themselves into settlement communications, redirect payments, or directly access banking credentials.
Penetration testing that includes social engineering and internal network assessment evaluates this specific risk.
Compliance Requirements
Cyber insurance applications increasingly ask whether firms conduct penetration testing. Some insurer panels and enterprise clients require evidence of recent testing.
Beyond compliance, testing provides evidence for board and partnership reporting that security is being actively assessed.
Professional Obligations
Lawyers have professional duties regarding client confidentiality. While regulatory guidance on cyber security continues to evolve, demonstrating active security assessment supports compliance with these obligations.
What to Expect From a Pen Test
A typical penetration testing engagement follows a structured process.
Scoping and Rules of Engagement
Before testing begins, the scope is defined:
- What systems and networks are in scope?
- What testing methods are authorised?
- Are there systems that must be excluded?
- What are the notification and escalation procedures?
- Who needs to know testing is occurring?
Clear rules of engagement protect both the firm and the testers.
Reconnaissance
Testers gather information about the target — public information about the firm, technical details about internet-facing systems, employee information from LinkedIn, and other open-source intelligence.
This phase mirrors what a real attacker would do before launching an attack.
Vulnerability Identification
Testers scan for known vulnerabilities in internet-facing systems, identify potentially weak configurations, and map out the attack surface.
Exploitation
Where vulnerabilities are identified, testers attempt to exploit them — gaining access, escalating privileges, and moving through systems as a real attacker would.
This phase is carefully controlled to avoid disrupting business operations.
Post-Exploitation
Once access is gained, testers explore what's possible — what data could be accessed, what systems could be compromised, how far into the environment an attacker could move.
This phase reveals the real-world impact of successful attacks.
Reporting
The engagement concludes with a detailed report covering:
- Executive summary for leadership
- Technical findings with evidence
- Risk ratings for each finding
- Remediation recommendations
- Verification of findings
Good reports are actionable — they tell you what to fix, in priority order, with specific guidance.
Common Findings in Law Firm Pen Tests
After testing many law firms, certain patterns emerge.
Phishing Susceptibility
Social engineering consistently works. Even firms with security awareness training have staff who click links and enter credentials. Phishing remains the most reliable initial access method.
Missing or Inconsistent MFA
Multi-factor authentication gaps are common. VPN without MFA. Legacy applications that don't support MFA. Admin accounts with MFA disabled for "convenience."
Credential Reuse
Staff using the same password across work and personal accounts. When those personal accounts are compromised in data breaches, those passwords become known — and work accounts become vulnerable.
Excessive Privileges
Users with access to data and systems beyond their job requirements. Flat networks where compromising any user provides access to sensitive data. Admin accounts used for daily work.
Unpatched Systems
Legacy systems with known vulnerabilities. Delayed patching cycles. Internet-facing applications running outdated software.
Weak Internal Segmentation
Once inside the network, attackers can often move freely. Limited network segmentation means a compromised reception workstation can access partner drives.
The Report Is Just the Beginning
Here's where many firms go wrong: they treat the penetration test report as the deliverable.
It's not. The deliverable is improved security.
The report identifies problems. What happens next determines whether the engagement was worthwhile.
Remediation Planning
Work with your IT team or provider to create a remediation plan. Prioritise critical and high-severity findings. Set realistic timelines. Assign owners for each remediation action.
Fix the Findings
This sounds obvious, but I've seen firms pay for penetration tests, receive the report, and do nothing. A year later, the same vulnerabilities exist.
Pen testing has no value if findings aren't addressed.
Verify Remediation
Once fixes are implemented, verify they work. This might involve targeted re-testing of specific findings, or a follow-up assessment.
Ongoing Testing
Security isn't a one-time project. Environments change. New vulnerabilities emerge. Staff turn over.
Regular penetration testing — annually at minimum — ensures security remains effective over time.
Choosing a Pen Testing Provider
Not all penetration testing is equal. When selecting a provider:
Relevant Experience
Look for testers with experience in professional services environments. They'll understand the specific risks law firms face and focus testing accordingly.
Qualifications
Recognised certifications (OSCP, CREST, GPEN) indicate baseline competence. Ask about the specific testers who will work on your engagement.
Methodology
Ask how testing will be conducted. What frameworks do they follow? How do they balance thoroughness with business disruption risk?
Reporting Quality
Ask for sample reports (sanitised, of course). Are findings clearly explained? Are recommendations actionable? Is the report accessible to non-technical readers?
Remediation Support
Will the provider help you understand and address findings? Some providers deliver reports and disappear; others partner through remediation.
Insurance and Liability
Ensure the provider has appropriate professional indemnity insurance. Testing inherently involves some risk — you want a provider who takes that seriously.
Scope and Budget
Penetration testing costs vary significantly based on scope.
A basic external network assessment might take 2-3 days. A comprehensive engagement including external testing, internal testing, social engineering, and application testing might take 2-3 weeks.
When budgeting, consider:
- What's most important to test?
- What's your risk appetite?
- What's your remediation capacity?
There's no point testing everything if you can't action the findings. A focused test with thorough follow-through beats a comprehensive test whose report gathers dust.
The Bottom Line
Penetration testing shows you security reality rather than security aspiration.
For law firms — holding sensitive client data, managing trust accounts, and operating under professional obligations — that reality check is essential.
The firms that get the most value from pen testing treat it as the beginning of a process, not the end. They action findings. They verify remediation. They test again.
The firms that get the least value treat the report as a compliance checkbox. They might satisfy an insurance question, but they haven't actually improved their security.
If you're considering penetration testing for your firm, or if you have a pen test report gathering dust and want help prioritising remediation, I'm happy to discuss.
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders. Threats, regulatory shifts, and practical tools from the field. No fluff.
Related Posts
- All
- Forensics
- Incident Response
- Security Insights
- Security News
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.