Posts by John Reeman
Welcome to the “Cybersecurity Loop” Edition #17
🎄 Ho Ho Ho! 🎄 Welcome to the festive edition of the cybersecurity loop! Quick heads up — I’m building something new for 2026. It’s called “The Reluctant CISO”: a private community for legal sector leaders who’ve inherited cybersecurity responsibility without the title, training, or team. If that sounds familiar, keep an eye out.…
READ MORE >>118 Australian Businesses Hit by Ransomware in 2025 | What Leaders Must Know
According to data tracked by ransomware.live, 118 Australian organisations have already been publicly impacted by ransomware this year. The victims span almost every sector of the economy — airlines, telecommunications providers, medical practices, retailers, manufacturers, professional services, and law firms. The diversity of targets reinforces an uncomfortable truth: no organisation is too small, too regulated,…
READ MORE >>Australian Clinical Labs Case: Lessons in Cyber Response & Communication
The ACL judgment is a valuable reminder that cyber-risk is not just about firewalls, malware signatures or patches. It’s also about how we interpret, act on and communicate the results of our investigations, particularly when external advisors are involved.
READ MORE >>Beyond the Gateway: Why Traditional Email Security Can’t Stop BEC Attacks Targeting M&A Deals and Trust Accounts
Welcome to the world of modern Business Email Compromise (BEC), where the attack vector isn’t a malicious payload, but elaborately constructed deception that exploits the very trust relationships that make business possible.
READ MORE >>The Hidden Battlefield: Why Traditional EDR Leaves Your Identity Layer Exposed
Modern cybersecurity has a blind spot problem. Organisations invest heavily in Endpoint Detection and Response (EDR) solutions, believing they’ve fortified their defences. Yet attackers continue to move laterally through networks, escalating privileges and exfiltrating data often without triggering a single alert. The reason? EDR tools excel at monitoring endpoints, but they fundamentally cannot see what…
READ MORE >>Digital Forensic Evidence Collection for Insider Threat Cases: Legal Guide 2025
Insider threats have fundamentally transformed with the proliferation of cloud computing, remote work arrangements and sophisticated data management systems. Unlike external cyber security breaches, insider threats involve individuals with legitimate system access who misuse their privileges. This creates unique challenges for legal practitioners, as the line between authorised and unauthorised activity can be subtle, requiring careful analysis of digital footprints to establish intent and scope of misconduct.
READ MORE >>Welcome to the “Cybersecurity Loop” – Edition #13
Now, before we unpack this month’s stories, just a quick note to let you know that we will be on Stand #55 at the ALPMA Summit 2025 in Sydney, 3 – 5 September. This year, for every person who visits our stand and plays our “Data Booster” game, you get a chance to win a…
READ MORE >>Cyooda Featured in the LawyersWeekly Legal Operations Guide 2025
Cyooda Proud to be Featured as the ONLY Cybersecurity Provider in Lawyers Weekly’s Legal Operations Guide 2025. We’re thrilled to announce that Cyooda has been selected as the exclusive cybersecurity provider featured in Lawyers Weekly’s prestigious Legal Operations Guide 2025. This recognition highlights our specialised expertise in protecting law firms from the ever-evolving landscape of…
READ MORE >>Digital Forensics: A Comprehensive Guide to Investigation, Recovery, and Analysis
Digital forensics has become increasingly critical as our world becomes more digitised. From smartphones and laptops to IoT devices and cloud storage, digital evidence can be found everywhere. Understanding digital forensics is essential for law enforcement, corporate security teams, legal professionals, and IT administrators who may need to investigate security incidents or recover lost data.
READ MORE >>The Hidden Deal Breaker: Why Cybersecurity is Critical for M&A Success
Over the last 5 years mergers and acquisitions represent more than just financial transactions. They’re complex integrations of digital ecosystems, data repositories, and cyber risk profiles. While traditional M&A due diligence focuses heavily on financial performance, market position and operational synergies, cybersecurity has emerged as a make-or-break factor that can determine whether a deal creates…
READ MORE >>