Legal Cybersecurity: What Businesses Need to Know About Protection in Cyberspace

We live in an era of rapid digital transformation, enabling accelerated growth, process optimisation, and efficient use of resources. At the same time, however, businesses are facing an entirely new category of risks.

Cyberattacks have repeatedly disrupted the operations of both private companies and public institutions worldwide. Data breaches and the disclosure of confidential information systematically cause significant damage to businesses, including reputational harm and loss of trust in a company and its brand. Therefore, the implementation of a robust cybersecurity framework is no longer optional, but an essential requirement for protecting modern business operations.

Why Cybersecurity Matters for Business

Cybersecurity in a corporate context is a комплекс of tools, policies, and procedures designed to prevent unauthorised access to company systems, ensure data integrity, and mitigate risks associated with cybercrime.

It is not limited to strong passwords or the use of licensed software. Rather, it encompasses a comprehensive system of measures and strategies aimed at protecting information systems, corporate data, and business assets from digital threats.

Such a system typically includes:

  • access control policies for information resources;
  • policies governing the processing and protection of personal and financial data;
  • rules on the handling of confidential information;
  • internal regulations on the use of mobile devices, as well as password creation and management.

Importantly, these policies must not exist merely as formalities. Their practical implementation and consistent enforcement by employees are critical. They should be clearly communicated, understood across the organisation, and regularly updated in response to evolving digital risks.

Companies with mature cybersecurity governance often adopt a “zero trust” model, under which no user or device is deemed trustworthy by default—even within the corporate network—and is therefore subject to continuous verification.

Equally critical is a well-structured access control policy, ensuring that employees only have access to the data strictly necessary for performing their duties.

Risk mitigation in this area requires ongoing engagement with personnel. Cybersecurity is not achieved through one-off training sessions, but through continuous awareness programmes, regular updates, and systematic education of employees.

Training as a Preventive Tool

In many IT-driven organisations, monthly training sessions are conducted to reinforce the importance of protecting confidential information and complying with non-disclosure agreements (NDAs). These sessions also address updates to cybersecurity policies, current threats, and practical improvements to internal security systems.

Regular cybersecurity training is beneficial across all industries. It equips employees with practical skills, including secure use of software, identification of cyber threats, and recognition of phishing attempts—one of the most распространённые forms of cyber fraud aimed at obtaining unauthorised access to sensitive or personal data.

Why Personal Devices Pose Risks

The use of personal devices (smartphones, laptops, tablets) for business purposes—particularly for transmitting corporate information—is highly discouraged.

Such practices create multiple vulnerabilities:

  • data remains outside controlled корпоративного environments;
  • loss or compromise of a device may result in unauthorised access to documents, credentials, and internal information.

Where messaging applications are used for internal communication, companies should implement two-factor authentication (2FA) and strictly limit the categories of information that may be shared via such channels.

Under no circumstances should personal data, financial information, passwords, or confidential business information be transmitted through unsecured messaging platforms.

Data as the Primary Target

The primary objective of most cyberattacks is to gain unauthorised access to databases, as they contain the most valuable corporate assets—personal data, commercial information, financial records, and other sensitive materials.

Accordingly, effective cybersecurity strategies must prioritise the protection of such data.

Passwords and Technical Safeguards

A key element of cybersecurity is the implementation of up-to-date technological solutions, including:

  • antivirus software;
  • firewalls;
  • data encryption tools.

Regular updates of software and security systems are essential to address emerging cyber threats.

At the same time, one of the most fundamental yet critical safeguards remains the use of strong and unique passwords. This goes beyond formal compliance with password requirements—it involves creating credentials that are resistant to brute-force and dictionary attacks and are not reused across multiple accounts.

The use of weak or identical passwords significantly increases the risk of system-wide compromise, even if only one service is breached.

Regular password rotation is also an important practice, particularly for access to critical systems and databases containing sensitive information, as it helps mitigate the impact of potential credential leaks—even if they are not immediately detected.

Email as a Key Risk Channel

Email remains a primary communication tool for most businesses, while simultaneously being one of the most common vectors for cyberattacks.

Attackers frequently use email to distribute phishing messages, malicious attachments, and fraudulent requests that often appear highly credible.

A single careless action—such as opening an attachment or clicking a link—may result in unauthorised access to corporate email systems and internal documentation.

To mitigate these risks, companies should implement email filtering mechanisms and continuously raise employee awareness of cyber threats.

Case Study

A recent case from our practice illustrates how sophisticated modern phishing attacks have become.

A client approached us after receiving what appeared to be an official request from a law enforcement authority, requiring the provision of certain documents as part of an alleged investigation.

At first glance, the message appeared entirely legitimate:

  • it contained references to applicable legislation;
  • it outlined liability for non-compliance;
  • it used legally accurate terminology;
  • it even included a unique access code, allegedly in accordance with the Law of Ukraine “On Personal Data Protection”.

The message was carefully designed to create a sense of urgency and legal obligation.

Based on its form and content, the client had no reason to doubt its authenticity and sought legal advice on how to respond appropriately.

However, an initial legal and technical assessment revealed that the message was, in fact, a phishing attempt.

Indicators of fraud, although well disguised, included:

  • discrepancies in the sender’s domain;
  • absence of established official procedures for such requests;
  • attempts to redirect the recipient to external links for “accessing” documents.

As a result, the client was promptly advised of the risks, which allowed them to avoid disclosing sensitive information and prevented unauthorised access to corporate data.

Conclusion

From a legal perspective, cybersecurity also falls within the scope of the due diligence principle and the obligation to implement appropriate technical and organisational measures for data protection.

Cyber threats may have severe consequences for businesses, including data breaches, reputational damage, and financial losses.

Accordingly, the implementation of a robust cybersecurity framework is not only a technological necessity, but also a legal standard of responsible business conduct.