Downloads & Toolkits
🚨Toolkit
Cyber Crisis Response Kit
Your 72-hour rescue kit. Incident response plan template, ransomware decision workflow, and resilience checklist. Be prepared before disaster strikes.
🔒Toolkit
Vendor Risk Assessment Template
Evaluate the security posture of your third-party vendors. Due diligence questionnaire for law firm suppliers and technology providers.
📧Checklist
Business Email Compromise Review
Assess your firm's exposure to BEC attacks. Invoice fraud, impersonation, and account takeover prevention checklist.
📋pdf
Incident Response Retainer Overview
What's included in an IR retainer? SLA commitments, response times, and how proactive preparation reduces incident costs.
☁️Guide
Microsoft 365 Security Checklist
Essential security settings for law firms using Microsoft 365. MFA, conditional access, and data protection configurations.
✅Checklist
Ransomware Readiness Checklist
Is your firm prepared for a ransomware attack? Practical guidance on the critical controls you should have in place right now.
Cyber Security How To's
How to build a successful cybersecurity program
By John Reeman |
Data Security and Privacy: Time to act is now!
By John Reeman |
To be or not to be a CISO
By John Reeman |
How To: Email Phishing, malicious payload analysis walkthrough
By John Reeman |
CyberChef : how to decode your data the easy way
By John Reeman |
How to measure the success of your cybersecurity program
By John Reeman |
Ransomware Resilience: How to prepare and respond in a crisis
By John Reeman |
Time altering techniques to evade your security controls
By John Reeman |
Endpoint Security Part 5: How to setup an automated isolation workflow when malware is detected
By John Reeman |
Endpoint Security Part 4: How to create a playbook to isolate a machine and alert your SOC team
By John Reeman |
Endpoint Security Part 3: How to correlate threat intelligence
By John Reeman |
Endpoint Security Part 2: Enriching your security event data
By John Reeman |
Why you need Azure Conditional Access Policies
By John Reeman |
Keeping your service provider honest!
By John Reeman |
Export your passwords from LastPass
By John Reeman |
Newsletter Archive
The Legal Cyber Brief — monthly cyber intelligence for law firm leaders.


