The Ohio Supreme Court's Rules of Professional Conduct — specifically Rule 1.6 — have long required attorneys to make "reasonable efforts" to prevent unauthorized disclosure of client information. But what qualifies as reasonable has shifted considerably. For West Chester law firm cybersecurity, the gap between what bar guidance now expects and what most small-to-midsize practices actually have in place is widening — and the consequences of that gap are no longer theoretical.
Ohio's Board of Professional Conduct clarified in 2018 that competence includes understanding cybersecurity risks relevant to a firm's practice. Since then, ransomware incidents targeting legal practices have become routine enough that the ABA tracks them annually. The 2024 ABA Legal Technology Survey found nearly 29% of respondents reported a security incident. For a firm with five to forty attorneys, a single successful attack typically means encrypted case files, compromised client data, and potential disciplinary exposure — all at once.
What Attackers Actually Want From a Law Firm
The value isn't always a ransomware payout. It's often the data itself. Litigation files, real estate transaction records, employment matters, estate documents — all of it is attractive to threat actors because it's sensitive, identifiable, and difficult for firms to disclose publicly without reputational damage.
West Chester's legal corridor, particularly practices along the Cincinnati-Dayton Road and Tylersville Road business districts, includes a concentration of transactional, family law, and estate planning firms. Many of these practices run modern platforms like Clio or iManage for case management, but their underlying IT infrastructure — endpoints, email, backup — hasn't kept pace with the software stack sitting on top of it.
The typical exposure pattern: a staff member's Microsoft 365 account gets phished. From there, an attacker has access to client email history, calendar entries, and potentially connected document management. The attorney's obligation under Rule 1.6 to notify affected clients kicks in immediately, triggering the painful process of reconstructing what was accessed and how far it spread.
The Specific Gaps That Create Liability
Three areas consistently separate firms that survive incidents from those that don't:
Endpoint Detection and Response
Standard antivirus doesn't catch modern threats. Platforms like SentinelOne — deployed by Titan Tech as part of our managed cybersecurity services — use behavioral AI to identify suspicious activity before it spreads laterally across a network. A law firm running legacy AV across unmonitored endpoints is operating on the assumption that nothing will go wrong, not that they'll detect it when it does. Those are very different risk postures.
Email and Identity Protection
Microsoft 365 is near-universal in legal practice, but default licensing doesn't include the security controls that matter most. Conditional access policies, multi-factor authentication on all privileged accounts, and monitoring for anomalous login patterns aren't automatic — they require deliberate configuration. An M365 tenant that was stood up quickly and never hardened is a common entry point for credential-based attacks.
Tested Backup and Recovery
Many firms have backups. Far fewer have tested whether those backups actually restore under pressure. When ransomware encrypts case files on a Friday afternoon, the question isn't "do we have backups?" — it's "can we be operational by Monday morning?" Titan Tech's backup and disaster recovery practice, built around Veeam, includes air-gapped copies that ransomware can't reach and documented recovery procedures that have been tested before the incident — not during it.
What the Bar Actually Expects Now
Ohio's guidance doesn't mandate specific technology, but it does establish a reasonableness standard that courts and disciplinary boards will evaluate based on the threat environment at the time of the incident. A firm in 2026 that responds to a breach by explaining it had antivirus installed is in a materially different position than one that can document layered security, a qualified managed security provider, and a tested incident response plan.
The ABA's formal ethics opinions on cloud computing make similar points: competence requires understanding the security posture of every platform handling client data. For firms using cloud-based practice management tools — Clio, NetDocuments, iManage — that due diligence extends to the entire IT environment those platforms operate within. You can't outsource the compliance obligation along with the software subscription.
Ohio also has state-level data breach notification requirements under ORC 1347.12 that trigger independently of any bar discipline. A breach involving personally identifiable client information can simultaneously create bar compliance exposure, civil liability, and mandatory breach notifications to affected individuals. The overlap creates compounding risk that most firms aren't thinking about until it's in front of them.
Where West Chester Firms Should Start
For most practices, the right first step isn't a full security overhaul — it's an honest audit. What endpoints are actively managed? Which accounts have MFA enforced? Where does backup data actually reside, and when was recovery last tested? Who receives an alert if something anomalous happens at 2 AM?
Titan Tech works with legal practices across Greater Cincinnati on exactly these questions. Our managed IT services give firms visibility and control without requiring in-house IT staff, layered with managed cybersecurity including SentinelOne EDR and Huntress MDR for 24/7 threat monitoring. For firms with significant regulatory exposure, our SIEM/MDR services provide the documented security posture that increasingly matters when bar compliance questions arise.
Attorney-client privilege is foundational to the practice of law. The infrastructure protecting that privilege deserves the same professional rigor as the legal work it supports.
If you're operating a law firm in West Chester or the broader Cincinnati region and want a straightforward assessment of where your current IT environment stands, contact Titan Tech for a no-obligation security review.

