Cyber Essentials Is Changing — Here’s What Law Firms Must Know

Cyber Essentials for law firms

From 27 April 2026, significant operational updates to the UK’s Cyber Essentials scheme will come into force. While the five core technical controls remain unchanged, the way they are assessed has tightened. Requirements are clearer, enforcement is stricter and ambiguity has been removed.

For SRA-regulated practices, these changes are particularly relevant. Although Cyber Essentials is not a mandatory regulatory requirement, the updated framework closely reflects the governance, risk management and data protection standards that law firms are already expected to maintain.

For firms holding or considering Cyber Essentials as part of a broader security strategy preparation should begin now.

Why Cyber Essentials Matters for Law Firms

The SRA Codes of Conduct do not specifically require Cyber Essentials certification. However, they do impose clear obligations around risk management, governance and client data protection.

Section 2.5 of the Code of Conduct for Firms requires firms to:

“Identify, monitor and manage all material risks to your business.”

Cyber risk is undoubtedly a material risk in modern legal practice.

Section 2.1 further requires firms to:

“Have effective governance structures, arrangements, systems and controls in place.”

In addition, firms must comply with UK GDPR and protect personal data against unauthorised access, loss, destruction or damage.

The Law Society has repeatedly highlighted the vulnerability of law firms to cyber crime. Legal practices hold highly sensitive information including client identities, banking details, transaction funds and confidential documents making them consistent targets for phishing, ransomware and account compromise.

In this context, Cyber Essentials for law firms provides a structured, government-backed baseline for demonstrating effective cyber governance.

What Is Changing in April 2026?

The April 2026 update introduces a new question set (known as Danzell) and tighter marking criteria. The five core control areas remain:

  1. Firewalls and internet gateways
  2. Secure configuration
  3. User access control
  4. Malware protection
  5. Security update management

However, assessment requirements are now more precise, particularly in the following areas.

1. The 14-Day Patch Requirement

All critical and high-risk security updates must be applied within 14 days of release.

This applies to:

  • Operating systems
  • Applications and extensions
  • Routers and firewalls
  • Network devices

Failure to meet this requirement will result in automatic assessment failure.

For law firms, this aligns directly with SRA expectations around managing material risks. Unpatched vulnerabilities represent known and preventable risks to client data. Informal patching cycles or delayed updates are no longer defensible under the scheme.

Structured, automated and documented patch management processes are essential.

2. Mandatory Multi-Factor Authentication (MFA)

From April 2026, MFA is mandatory for all cloud services where it is available.

This includes Microsoft 365, Azure, Google Workspace and most cloud-based case management platforms. Partial implementation is not sufficient.

Given the prevalence of email-based fraud and account compromise in the legal sector particularly in conveyancing and financial transactions strong authentication is critical.

The Law Society identifies weak passwords and poor access controls as common vulnerabilities. MFA significantly reduces the risk of unauthorised access and is now considered baseline security rather than enhanced protection.

For firms reviewing Cyber Essentials for law firms, full MFA coverage should be treated as a priority.

3. Cloud Services Fully in Scope

For the first time, Cyber Essentials formally defines cloud services and makes clear they cannot be excluded from assessment scope.

Any cloud service storing or processing organisational data must be included. This includes:

  • Cloud-hosted case management systems
  • Document management platforms
  • Finance and HR systems
  • Identity and authentication services

While cloud providers may secure their infrastructure, responsibility for configuration and access control remains with the firm under the shared responsibility model.

From a regulatory perspective, outsourcing infrastructure does not remove accountability. SRA-regulated firms remain responsible for protecting client data, regardless of where it is hosted.

4. Clearer Scope and Governance Requirements

The updated scheme requires firms to clearly define:

  • What systems are in scope
  • Which legal entities are included
  • How excluded systems are segregated

This emphasis on documentation aligns with regulatory expectations around governance structures and internal controls.

For COLPs and compliance officers, clarity of scope reduces risk and strengthens defensibility in the event of regulatory scrutiny.

Maintaining Competence and Training

The SRA Code of Conduct also requires firms to ensure managers and employees remain competent and keep professional knowledge up to date.

Cyber security awareness is therefore part of professional competence.

The Law Society recommends:

  • Training staff to recognise phishing
  • Implementing secure password practices
  • Managing remote working risks
  • Avoiding insecure devices and unsafe applications

Technology controls alone are insufficient. People remain a critical component of effective cyber resilience.

When Things Go Wrong

If a breach occurs, firms have clear regulatory obligations.

The SRA requires transparency with affected clients and prompt reporting of serious breaches. Firms may also need to notify:

  • The Information Commissioner’s Office (ICO)
  • Their Professional Indemnity Insurer
  • Relevant regulatory bodies

Having documented controls, risk assessments and structured governance processes in place helps demonstrate that reasonable steps were taken to manage risk.

This is where Cyber Essentials for law firms can support a defensible compliance position.

Preparing for April 2026

Existing certificates remain valid until expiry. However, any renewal after 27 April 2026 will be assessed against the updated requirements.

Law firms should now:

  • Review patch management processes for 14-day compliance
  • Confirm MFA is enabled across all cloud services
  • Map and document all systems in scope
  • Conduct a formal cyber risk assessment
  • Assign clear governance responsibility for cyber security

Preparation well in advance of renewal reduces the risk of delays or failed assessments.

Final Thoughts

Cyber Essentials is not mandated by the SRA. However, the April 2026 updates bring the scheme closer to the standards regulators already expect from modern legal practices.

For law firms handling sensitive client data, security must be measurable, documented and consistently enforced. Cyber Essentials for law firms provides a structured framework for demonstrating effective risk management and governance.

If your firm is reviewing certification, planning a renewal, or strengthening its cyber security in line with SRA expectations, specialist support can make the process clearer and more efficient. As managed IT specialists for law firms, we work exclusively with the legal sector to align technical controls with regulatory obligations  ensuring security is both practical and compliant.

Say hello to our friendly team of experts.

Take the first step to an improved and streamlined IT support services