Category:

Security Insights

Digital Forensics and Incident Response (DFIR)

Rapid Cyber Incident Response: The Critical Role of Speed, Quality, and Tooling

By John Reeman / November 11, 2024

Cyberattacks, ranging from ransomware, data breaches, business email compromise to advanced persistent threats (APTs), can strike at any moment, potentially causing significant damage. So having rapid and effective incident response is essential to minimise the impact of cyberattacks and to protect an organisation’s sensitive data, reputation, and business continuity. For organisations of any size, the…

Read More
Digital Forensics in the Cloud for M365, Azure, AWS and GCP

Unlocking the Secrets of Cloud Digital Forensics | M365

By John Reeman / October 28, 2024

Welcome to the world of cloud forensics, where investigations in cloud environments like AWS, Azure, GCP, and M365 require unique expertise and tools. As organisations increasingly rely on these platforms for their business operations, the need for effective cloud forensics becomes paramount. In this article, we will unveil the intricacies of cloud forensics and explore…

Read More
Mobile Phone Forensics

The Crucial Role of Mobile Device Forensics: Unveiling Hidden Secrets

By John Reeman / October 28, 2024

I think we can all agree that mobile phones have become an extension of ourselves, storing important information about our lives. From personal messages to financial transactions, these devices hold a wealth of data. But what happens when this data is compromised or needs to be unearthed for investigative purposes? This is where digital forensics…

Read More
Email Security 101

Email Security 101: Getting the basics right

By John Reeman / September 12, 2024

EMAIL SECURITY 101 This article delves into getting the basics of email security correct in your organisation. So, let’s start with the basics and grounding in terminology! Email basics The original basis of Internet email uses the SMTP protocol, which stands for Simple Mail Transfer Protocol. This protocol has no features for authentication, validation, or…

Read More
Business email compromise scams

Learnings from business email compromise and payment scams

By John Reeman / September 11, 2024

Over the last few months, I’ve helped with several incident response cases involving impersonation fraud and business email compromise.  The businesses involved were different in size and industry, but they all had one thing in common: handling and processing reasonable amounts of money.  This makes them attractive targets for cybercriminals who engage in social engineering…

Read More
cyber security for law firms

Cyber Security for Law Firms

By John Reeman / September 11, 2024

Cyber Security for Law Firms : 15 Essential Controls 1. Implementing Strong Password Policies and Multi-Factor Authentication Password security is a fundamental aspect for all businesses to undertake.  Implementing strong password policies, such as requiring complex passwords and regular password changes, can help prevent unauthorised access to sensitive information. But a single password on its…

Read More
Australian Data Privacy Reforms

Improve your Data Security and Privacy : Six Step Process

By John Reeman / August 14, 2024

Australian Data Privacy Act Reforms – Aug 2024 The Australian Data Privacy reforms are about to come into affect at the end of August 2024.  So there has never been a better time to get your organisations’s data security and privacy controls in check than now! If you missed what the reforms are about here…

Read More
Virtual CISO Services

What is a Virtual Chief Information Security Officer?

By John Reeman / July 29, 2024

Bringing Cybersecurity Expertise to Your Business: The Power of a Virtual Chief Information Security Officer In today’s rapidly evolving digital landscape, businesses are faced with an increasingly complex and sophisticated range of cybersecurity threats. Protecting sensitive data, mitigating risks, and ensuring compliance have become vital priorities for organisations of all sizes. Enter the Virtual Chief…

Read More

Cyber Incident Response | What Law Firms need to know

By John Reeman / July 10, 2024

🔒Choosing the right Incident Response Service for your law firm is not just a decision, it’s an investment in your firm’s future.🔒 In the current cyber landscape, small businesses are no longer immune to the threats that were once only a concern for big corporations. Each day we see how cyber threats are becoming more…

Read More
Cyber Security for Law Firms

Cyber Security for Law Firms: What you need to know

By John Reeman / July 10, 2024

Introduction: Cyber Security for Law Firms In today’s threat landscape, protecting sensitive client information has become a critical concern for law firms around the world. With cyber threats on the rise, it’s imperative for legal professionals to have a comprehensive understanding of cyber security measures to safeguard their firm’s data and reputation. This guide aims…

Read More