Lawyers have an ethical duty to protect their clients' data. Below are steps you can take to help protect both your clients and your practice. 

Reporting Cybercrime

Internet-related crime, like any other crime, should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international levels, depending on the scope of the crime. Citizens who are aware of federal crimes should report them to local offices of federal law enforcement.

Check out the following resources to report a crime and for additional information and assistance:

FBI   / Internet Crime Complaint Center


Better Business Bureau Scam Stopper

No More Ransom Project

Identity Theft Resource Center

Reporting Phishing

Where to Report an Actual Phishing Crime:

Websites to Report Phishing Messages to:

Step 1. If you got a phishing email, forward it to the FTC at and to the Anti-Phishing Working Group at If you got a phishing text message, forward it to SPAM (7726).

Step 2. Report the phishing attack to the FTC at

Threat Information and How to Prevent and Protect

Physical Security and Cybersecurity

The One Thing that Protects a Laptop After It's Been Stolen

5 Cybersecurity Steps You Should Already Be Taking

Data Breaches

The Anatomy of a Data Breach

Ransomware and Malware

Protect Your Firm from Ransomware 

How to Identify and React to Malware Threats

Beware of Malware: Think Before You Click!

A New Reason Why Your Computer is Running Slow

Phishing, Spoofing, Whaling, Spearphishing

What is Phishing?

10 Tips for Spotting a Phishing E-mail

Beware of Phishing Scams: Don’t Take the Bait

Protect Your “Cyber Home” With a Solid Foundation


Cyber Fraud

10 Things You Can Do to Avoid Fraud

5 Tips for Spring Cleaning Your Digital Footprint

Website Security

Insecure Websites

Password Security

Common Password Problems 

Don't Store Passwords in a Browser

Expired Password Scams

Internet of Things Security

IOT in the Office: Everything You Need to Know about the Internet of Things

Social Media Security

The Complete Guide to Facebook Privacy Settings

Smartphone, App, and Chatbot Security

Phone Hijacking

Three Questions to Ask Before Downloading an App

Customer Service Chatbots: How Safe are They?

Cybersecurity Planning, Education and Cyberinsurance

Small Business Cybersecurity Corner - an online resource from NIST and several partners to "disseminate consistent, clear, concise, and actionable resources to small businesses"

FCC Small Biz Cyber Planner - an online resource to help small businesses create their own cybersecurity plans

Technology/Cybersecurity Management Policies - by: Sharon D. Nelson and John W. Simek

10 Ways to Develop Cybersecurity Policies and Best Practices 

Discussing Cybersecurity with your Employees via StaySafe Online

The Anatomy of a Data Breach - by: Sharon D. Nelson and John W. Simek

Cybersecurity Audits and Options for Your Law Firm - by: Sharon D. Nelson and John W. Simek 

Cyberinsurance: Necessary, Expensive and Confusing as Hell - by: Sharon D. Nelson and John W. Simek

The GDPR Cyber Insurance Checklist: Are You Covered? - by: Judy Selby

Removing the Mystery from Cyberinsurance - by: Judy Selby

Additional Resources

Computer and Network Security

Legal Cloud Computing Association Standards

Stay Safe Online

Center for Internet Security


Tips and Alerts


Anti-Phishing Working Group

Federal Trade Commission


No More Ransom Project

Scams and Fraud

Better Business Bureau’s Scam Stopper 

Scams & Identity Theft

Common Fraud Schemes 

Consumer News

Federal Trade Commission

Identity Theft

ID Theft & Fraud

Additional Resouces and Safeguard Solutions

Securing Old Technology & Equipment

DISCLAIMER: This information (or the names of these products are) is passed along without any warranties by the South Carolina Bar as to its fitness for a particular purpose. It has not been tested by the Bar  and is offered for your information only.