Welcome to the “Cybersecurity Loop” – Edition #12

Every few weeks, I share a quick pulse on what's happening in the world of cybersecurity, framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted.
Here's what's hot this month — and what you should be thinking about.
🧨 HOT this month - July 2025
July has been a watershed moment for cybersecurity in the legal sector. The 2025 Integris Report shows that 37% of clients (https://integrisit.com/law-firm-cybersecurity-2025-report/) are willing to pay a premium for firms with strong cybersecurity measures, fundamentally shifting how we think about cyber investment from cost centre to competitive advantage.
Meanwhile, June 2025 saw 33 publicly disclosed cyber security incidents, including the leak of 16 billion user credentials compiled from years of infostealer malware and previous breaches. The message is clear: the threat landscape is intensifying, but client expectations are rising even faster.
What's particularly concerning is that AI is accelerating the speed of cyberattacks, with break out times now often under an hour. So lets think about that, if your security operations team are unable to detect suspicious activity in minutes and act on it you could be in trouble. For law firms handling time-sensitive matters, this compression of response windows demands immediate attention to detection and response capabilities.
🔐 Cyber Bytes - 4 Stories worth noting
- AI-Powered Attacks Reach New Sophistication - In 2025, we are likely to see more cybercriminals utilising AI to launch more targeted and automated attacks. AI could be used to create deepfake videos or voice recordings to trick lawyers or clients into authorising financial transactions or sharing sensitive data. The legal sector needs to prepare for social engineering attacks that bypass traditional detection methods through hyper-realistic impersonation.
- The Healthcare Sector Under Siege Sets a Warning for Legal - June was notable for a surge in ransomware disruptions across the healthcare and government sectors, with attackers specifically targeting sectors that hold high-value personal data. Law firms share similar data profiles and should expect increased targeting based on these patterns.
- Supply Chain Vulnerabilities Expanding - Attacks on The North Face and Gluestack demonstrated how credential reuse and malicious code injection remain active and dangerous vectors. The Qantas data breach story continues to unravel but is a sharp reminder that it doesn't matter how big an organisation you are the complexities of supply chains can hurt if not properly governed, causing significant damage. Law firms, in particular, have extensive vendor ecosystems that create multiple attack surfaces, requiring constant monitoring and assessment.
- Compliance Costs Rising Globally - The growing patchwork of data privacy regulations across the U.S., many of which are similar and overlap, will continue to increase compliance burdens on organisations. With NIS2 and DORA implementations alongside local Australian requirements, compliance costs are becoming a significant budget consideration for multinational law firms.
Tool
I've recently updated the cybersecurity response kit that was published last week in Lawyers Weekly.

The comprehensive kit includes a tool that serves as a guide to help you evaluate your ability to respond to a cyber crisis. I recommend starting with the Incident Response Scorecard, a 20-minute assessment that provides an immediate evaluation of your firm's current security posture and identifies priority areas for enhanced protection.
The materials included will enable your team to:
- Execute coordinated incident response protocols
- Minimise operational disruption during security events
- Maintain client confidence and regulatory compliance
- Make strategic decisions under pressure
If you have questions about implementing these frameworks or require additional guidance, please don’t hesitate to get in touch.
You can download the kit here: [https://cyooda.com/services/respond/72-hour-cyber-crisis-response-kit ]
Tip
Implement "Zero Trust Verification" for all bank transfers or international transfer requests. Business Email Compromise(BEC) scams are particularly damaging, as attackers often impersonate managing partners or clients to divert these transfers or request sensitive documents.
Establish a mandatory out-of-band verification protocol: Any bank transfer or sensitive document request received via email must be confirmed through a separate communication channel(phone call, secure portal, or in-person verification) before execution. Create a specific codeword system with regular clients for additional verification. One Sydney firm prevented a $2.8 million loss last month using this exact protocol when an AI-generated deepfake voice call followed a convincing BEC email.
Resource
McKinsey's 2025 AI Cybersecurity Framework provides comprehensive guidance on balancing AI opportunities with security risks. Organisations are leveraging AI to reduce their mean time to detect, respond, recover and stay ahead of advanced attackers. The framework includes practical playbooks for implementing AI-driven security controls while maintaining ethical AI usage standards.
What makes this particularly valuable for law firms is its focus on client confidentiality considerations and regulatory compliance aspects specific to professional services. Their source includes template policies for AI usage in client matters and risk assessment matrices tailored to legal workflows.
Access: [https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity]
Quote
"The increasing sophistication of threat actors means law firms simply cannot afford any gap in their defences. This is at a financial cost for law firms, but when you consider the costs of a successful attack – reputation, rehabilitation, business interruption, restoration, to name but a few – the spend starts to look more like an investment." - Sharon Glynn, Director and Underwriter, Travelers Europe (2025)
Have something to add or a question for an upcoming edition? Drop me a message — I'd love to hear what's top of mind for you right now.
Until next time, stay secure. — John Reeman
Cyber Strategy | Cyber Defence | Cyber Incident Response — for Law Firms