|CookieConsent||https://www.clc-uk.org/||Stores the user's cookie consent state for the current domain||1 Year||HTTP|
|_ga||https://www.clc-uk.org/||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||1 Year||HTTP|
|_gat||https://www.clc-uk.org/||Used by Google Analytics to throttle request rate||Session||HTTP|
|_gid||https://www.clc-uk.org/||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||Session||HTTP|
|collect||google-analytics.com||Used to send data to Google Analytics about the visitor's device and behaviour. Tracks the visitor across devices and marketing channels.||Session||Pixel|
|GPS||youtube.com||Registers a unique ID on mobile devices to enable tracking based on geographical GPS location.||Session||HTTP|
|VISITOR_INFO1_LIVE||youtube.com||Tries to estimate the users' bandwidth on pages with integrated YouTube videos.||1 Year||HTTP|
|YSC||youtube.com||Registers a unique ID to keep statistics of what videos from YouTube the user has seen.||Session||HTTP|
Businesses of all sizes now suffer cyber incidents. Law firms are no different. It is a matter of when, not if.
Firms need to understand just how dangerous and disruptive an attack can be - it's not just the incident itself but the recovery from it that has the potential to heavily disrupt client work and suck up huge amounts of management time, money and energy.
For these purposes, we expect that firms are keeping on top of their IT security. Your IT department/supplier should be continually monitoring the range of data protection options and counter-measures available.
The risk and impact of a cyber incident can be effectively reduced by segmenting, rather than separating, systems. You should deploy an
endpoint detection response tool to spot an incident, which will quarantine any device which has this problem detected.
You need to keep on top of awareness among staff and clients and test regularly to see if your systems can be penetrated in different ways.
We have identified five issues to consider in preparing for an incident:
processes and maintain a separate list of customers so you can contact them if core systems are down.