Welcome to the “Cybersecurity Loop” Edition #17

Cybersecurity loop December 2025

🎄 Ho Ho Ho! 🎄 Welcome to the festive edition of the cybersecurity loop!   Quick heads up — I’m building something new for 2026. It’s called “The Reluctant CISO”: a private community for legal sector leaders who’ve inherited cybersecurity responsibility without the title, training, or team. If that sounds familiar, keep an eye out.…

READ MORE >>

118 Australian Businesses Hit by Ransomware in 2025 | What Leaders Must Know

Ransomware Hits 118 Australian Businesses

According to data tracked by ransomware.live, 118 Australian organisations have already been publicly impacted by ransomware this year. The victims span almost every sector of the economy — airlines, telecommunications providers, medical practices, retailers, manufacturers, professional services, and law firms. The diversity of targets reinforces an uncomfortable truth: no organisation is too small, too regulated,…

READ MORE >>

The Hidden Battlefield: Why Traditional EDR Leaves Your Identity Layer Exposed

Non Human Identity - A new battleground

Modern cybersecurity has a blind spot problem. Organisations invest heavily in Endpoint Detection and Response (EDR) solutions, believing they’ve fortified their defences. Yet attackers continue to move laterally through networks, escalating privileges and exfiltrating data often without triggering a single alert. The reason? EDR tools excel at monitoring endpoints, but they fundamentally cannot see what…

READ MORE >>

Digital Forensic Evidence Collection for Insider Threat Cases: Legal Guide 2025

Insider Threats

Insider threats have fundamentally transformed with the proliferation of cloud computing, remote work arrangements and sophisticated data management systems. Unlike external cyber security breaches, insider threats involve individuals with legitimate system access who misuse their privileges. This creates unique challenges for legal practitioners, as the line between authorised and unauthorised activity can be subtle, requiring careful analysis of digital footprints to establish intent and scope of misconduct.

READ MORE >>

Cyooda Featured in the LawyersWeekly Legal Operations Guide 2025

Cyooda Security Featured in Lawyers Weekly Legal Operations Guide 2025

Cyooda Proud to be Featured as the ONLY Cybersecurity Provider in Lawyers Weekly’s Legal Operations Guide 2025. We’re thrilled to announce that Cyooda has been selected as the exclusive cybersecurity provider featured in Lawyers Weekly’s prestigious Legal Operations Guide 2025. This recognition highlights our specialised expertise in protecting law firms from the ever-evolving landscape of…

READ MORE >>

Digital Forensics: A Comprehensive Guide to Investigation, Recovery, and Analysis

A complete guide to digital forensics

Digital forensics has become increasingly critical as our world becomes more digitised. From smartphones and laptops to IoT devices and cloud storage, digital evidence can be found everywhere. Understanding digital forensics is essential for law enforcement, corporate security teams, legal professionals, and IT administrators who may need to investigate security incidents or recover lost data.

READ MORE >>

The Hidden Deal Breaker: Why Cybersecurity is Critical for M&A Success

M&A and Cybersecurity due diligence

Over the last 5 years mergers and acquisitions represent more than just financial transactions.  They’re complex integrations of digital ecosystems, data repositories, and cyber risk profiles.  While traditional M&A due diligence focuses heavily on financial performance, market position and operational synergies, cybersecurity has emerged as a make-or-break factor that can determine whether a deal creates…

READ MORE >>