At some point, after 2020, there must have been a meeting between management at the Legal Aid Agency (LAA) and the government when the LAA computer systems were discussed. Someone in that meeting may have raised the possibility of cyber-attack and the necessary steps which would need to be taken in order for proper cyber security, or cyber resilience, to be put in place. A number representing the costs for those appropriate steps could have been mentioned. And following that meeting, someone has concluded that spending money to protect critical infrastructure at the LAA was simply not worth it. In April 2025, the LAA discovered a cyber-attack following a breach four months earlier on 31 December 2024. In January 2026, the LAA has still not fully recovered.

Numbers crunched and in context

The Office for Budget Responsibility (OBR) estimates that a cyber-attack on national critical infrastructure could temporarily increase borrowing by over £30 billion – equivalent to 1.1% of Gross Domestic Product (GDP). Independent research for the Department for Science, Innovation and Technology suggests the average cost of a significant cyber-attack in the UK is now over £190,000.* This amounts to around £14.7 billion a year across the economy – equivalent to 0.5% of the UK’s GDP.

To place this in context this is seven times the entire annual budget for criminal legal aid, based upon the independent research; and over 14 times the criminal legal aid budget based upon the OBR research. According to the OBR, the cost of a significant cyber-attack to the UK government is 127.5 times more expensive than the entire budget for government-backed legal assistance to individuals in the civil courts. Whether or not you believe that an innocent woman should be provided with free representation to defend a criminal allegation, or a father should have the assistance of a solicitor to secure contact with their children, it is clear that the impact of a significant cyber-attack is economically serious.

So, what is the ‘one thing’ being done to stop this?

On 12 November 2025, the UK government introduced the Cyber Security and Resilience Bill to ‘strengthen national security and protect growth by boosting cyber protections for the services that people and businesses rely on every day’. 

One thing that Liz Kendall, Secretary of State for Science, Innovation and Technology, did was say: ‘I’m sending them a clear message: the UK is no easy target.’ National Cyber Security Centre CEO Dr Richard Horne, meanwhile, urged: ‘We must act at pace to improve our digital defences and resilience.’

But what does this all actually mean? And what is the one thing, the really practical thing, that might actually make a difference?

Is the legal sector a ‘critical service’?

Announced in the King’s Speech, the Cyber Security and Resilience Bill has been designed to strengthen cyber defences across Britain’s ‘critical sectors’, including public services such as healthcare, drinking water, transport and energy. The Bill will make amendments to the Network and Information Systems Regulations 2018 (NIS) to bring the UK’s domestic legislation in line with the European Union’s NIS2 Directive which was brought into force in October 2024. The question is, though, which sectors will be considered ‘critical’, and is there any part of the legal sector that may be affected?

The NHS and utility companies have been specifically mentioned as ‘critical public services’ which must comply with the Act when in force. Suppliers to these services will also fall within the remit. IT service providers to the NHS, for example, will be deemed as critical by association. This will include help desk support and IT management which will be required to meet stricter cyber security requirements.

Regulators will also gain new powers to designate critical suppliers to essential UK services – such as diagnostic labs serving the NHS or chemical suppliers to water companies – if they meet specific criteria. Designated suppliers must comply with minimum security standards, closing supply chain gaps that cybercriminals could exploit to cause wider disruption. 

Barristers or chambers supplying legal advice to critical public services could potentially fall within this ‘critical by association’ designation.

Creating a cyber governance culture

The Cyber Security and Resilience Bill is one of a number of legislative steps that might have a practical impact. (I am a little sceptical that the Secretary of State’s message will actually deter cyber criminals.) On 8 April 2025, the Cyber Governance Code of Practice was published. This has been created to support boards and directors in governing cyber security risks. The Code sets out the most critical governance actions for which directors are responsible. The Code is focused on medium and large businesses over 70% of which have reported that they have experienced some form of cyber-attack in the last 12 months.

The Code is not necessarily designed with chambers in mind, and certainly not for individual practitioners, but considering the areas of advice is certainly worthwhile: A. Risk management; B. Strategy; C. People; D: Incident planning, response and recovery; and E: Assurance and oversight. The Bar Council and Law Society Questionnaire encompasses elements of the advice, for example Action A4, to assess the risk from supply chain and business partners. Similarly, promoting a cyber security culture that encourages positive behaviour (Action 1C) might be good for any clerks room; and Action D1, gain assurance that the organisation has a plan to respond and recover from a cyber incident, if heeded, may have assisted the LAA following their cyber attack last year.

But big picture thinking, soundbites and calls for action can feel very nebulous when going about your day-to-day. Even legislative action is only as practically useful as the people implementing it. While Horne is absolutely correct that we must all improve our cyber resilience ‘at pace’, encompassing this into a single practical step may be tricky. And to some extent it is. Cyber resilience does require a cultural change. A mind-set which appreciates the importance of cyber security, and a willingness to put the necessary steps in place: design the policies and procedures; undertake the training; follow the advice and guidance; achieve the Cyber Essentials certification.

So, what is the ‘one thing’ barristers can do?

Change your password. It is so important. Password1! Is not a safe password. In fact, it is the equivalent of not having a password at all. You are effectively allowing anyone who knows your name to access your personal details. Not tech-savvy cyber criminals employing the most up-to-date artificial intelligence to apply the latest techniques in social engineering. Anyone who knows your name. And changing it to P@55w0rd1! Is only marginally better. Many username/password combinations can be found on the dark web. Following the TalkTalk hack in 2015 (and even before) huge lists can be purchased for very modest sums. So if you are using the same password as you did at Bar school or university, your personal data is exposed.

Change your password to three simple words. Even better, generate a random password which is secured by biometric data; either a fingerprint or face ID. Also, activate multi-factorial identification. And change all of your passwords. I know it is tedious, time consuming and may feel unnecessary. But access to one account can provide information that can lead to another. Do not allow an unsecured Hotmail account from 2014 to crash the entire IT network of your best solicitor. So, if you do one thing: change your password. 


References

‘LAA system was ‘extremely high risk’ in 2021, MPs told’, Law Society Gazette, 27 October 2025

‘The fiscal risks posed by cyberattacks’, Office for Budget Responsibility, 2021

Independent research by Alma Economics, KPMG and Frontier Economics on the economic impact of cyber-attacks on the UK, for the Department for Science, Innovation and Technology, 12 November 2025

Cyber Governance Code of Practice, Department for Science, Innovation and Technology and National Cyber Security Centre, April 2025

Bar Council and Law Society Cyber Security Questionnaire

Cyber Essentials