Cybersecurity resources

Protect your law firm's critical assets with our comprehensive cyber security resource centre.

We provide valuable insights and tools to keep your business protected.

 

 

Featured Cyber Security Services

Managed CyberSecurity Services

Digital Forensics and Incident Response

The key to mitigating the impact of any cybersecurity incident is the reaction time between detection and response.

Many organisations lack the resources needed to react in a quick and secure manner.  We provide your organisation with the resilience and expertise you need in a crisis to contain and identify the threat so you can become business operational again with minimum disruption and damage.

LEARN MORE
John Reeman - Virtual CISO

Virtual CISO Services

Are you finding it challenging to recruit a full time cyber security expert?  

It's hard to find and keep good security professionals and many growing businesses can't justify the expense of hiring a full time CISO.

Cyooda Security can provide an on demand cyber security expert on a medium to long term, part time basis, at a fraction of the cost of employing a full time CISO.

LEARN MORE

Cyber Security How To's

Infostealer Alert

Highly Malicious MacOS Infostealer

This morning in between meeting I was researching prices for solar batteries and was redirected to a Cloudflare “are you human page” that then failed but asked me to open up a terminal and paste in “I am human with a cloudflare ID”. As soon as I saw this my I knew it was bad…
Read More
Top Australian Cyber Security Blog 2025

Top Australian Cybersecurity Blog

🏆 𝐖𝐞’𝐯𝐞 𝐛𝐞𝐞𝐧 𝐫𝐞𝐜𝐨𝐠𝐧𝐢𝐬𝐞𝐝! 🏆 Cyooda Security has been named one of the 𝐓𝐨𝐩 🔟 𝐀𝐮𝐬𝐭𝐫𝐚𝐥𝐢𝐚𝐧 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐁𝐥𝐨𝐠𝐬 by 𝐅𝐄𝐄𝐃𝐒𝐏𝐎𝐓! This recognition reflects our commitment to helping law firms across Australia and the Asia-Pacific stay ahead of cyber threats with practical, relevant, and trusted insights. A huge thank you to our clients, community, and…
Read More
72-hour Cyber Crisis Response Kit

Cyber Crisis Simulations for Law Firms: Are You Ready?

Are You Ready for the Next Cyber Attack? When a cyber breach hits your firm, the first 72 hours will define your future. Panic, silence, or poor decisions can do more damage than the attackers themselves. That’s where cyber crisis simulations step in-not as a checkbox exercise, but as a mission-critical rehearsal that can make…
Read More
The journey to become a CISO

The Ultimate Guide to becoming a CISO

The Journey to becoming a Chief Information Security Officer (CISO) As cybersecurity threats grow more complex and pervasive, the role of the Chief Information Security Officer (CISO) has become a cornerstone of most enterprise organisations. For aspiring cybersecurity professionals, reaching the CISO level represents both a significant challenge and a rewarding culmination of their career. …
Read More
Top 100 CyberSecurity Blogs

The ultimate Top 100 Cyber Security Blogs in the World

This comprehensive list represents the most influential and widely-followed cybersecurity websites, blogs, and resources globally, compiled from multiple industry rankings and expert recommendations. Tier 1: Elite Cybersecurity News & Information Sources (1-25) The Hacker News – Leading cybersecurity news platform with 4.5+ million followers KrebsOnSecurity – Brian Krebs’ investigative cybersecurity journalism Dark Reading – Trusted…
Read More
IRAP Assessment

Demystifying an IRAP Assessment: Everything You Need to Know

Is your law firm looking to understand the ins and outs of an IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security and…
Read More
Crafting an AI Policy

Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy

In the rapidly evolving landscape of artificial intelligence (AI), crafting a powerful AI policy is essential for unlocking its potential while ensuring ethical and responsible use. With the technology becoming more widely adopted in various industries, organizations face the challenge of balancing innovation and accountability. In this ultimate guide, we will explore the key principles…
Read More
Defenders have to get it right 100% of the time: Attackers only Once

Attackers only have to get it right once: Defenders 100% of the time!

𝐀𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐨𝐧𝐥𝐲 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 𝐨𝐧𝐜𝐞, 𝐝𝐞𝐟𝐞𝐧𝐝𝐞𝐫𝐬 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 100% 𝐨𝐟 𝐭𝐡𝐞 𝐭𝐢𝐦𝐞! Do defenders really have to get it right 100% of the time though? 🤔 I’ve heard this phrase so often over the last decade and sometimes by people who should know better, 𝐢𝐭’𝐬 𝐭𝐢𝐦𝐞 𝐭𝐨 𝐜𝐚𝐥𝐥 𝐁𝐒…
Read More
Digital Forensics and Incident Response (DFIR)

Rapid Cyber Incident Response: The Critical Role of Speed, Quality, and Tooling

Cyberattacks, ranging from ransomware, data breaches, business email compromise to advanced persistent threats (APTs), can strike at any moment, potentially causing significant damage. So having rapid and effective incident response is essential to minimise the impact of cyberattacks and to protect an organisation’s sensitive data, reputation, and business continuity. For organisations of any size, the…
Read More
Digital Forensics in the Cloud for M365, Azure, AWS and GCP

Unlocking the Secrets of Cloud Digital Forensics | M365

Welcome to the world of cloud forensics, where investigations in cloud environments like AWS, Azure, GCP, and M365 require unique expertise and tools. As organisations increasingly rely on these platforms for their business operations, the need for effective cloud forensics becomes paramount. In this article, we will unveil the intricacies of cloud forensics and explore…
Read More
Mobile Phone Forensics

The Crucial Role of Mobile Device Forensics: Unveiling Hidden Secrets

I think we can all agree that mobile phones have become an extension of ourselves, storing important information about our lives. From personal messages to financial transactions, these devices hold a wealth of data. But what happens when this data is compromised or needs to be unearthed for investigative purposes? This is where digital forensics…
Read More
Email Security 101

Email Security 101: Getting the basics right

EMAIL SECURITY 101 This article delves into getting the basics of email security correct in your organisation. So, let’s start with the basics and grounding in terminology! Email basics The original basis of Internet email uses the SMTP protocol, which stands for Simple Mail Transfer Protocol. This protocol has no features for authentication, validation, or…
Read More
Business email compromise scams

Learnings from business email compromise and payment scams

Over the last few months, I’ve helped with several incident response cases involving impersonation fraud and business email compromise.  The businesses involved were different in size and industry, but they all had one thing in common: handling and processing reasonable amounts of money.  This makes them attractive targets for cybercriminals who engage in social engineering…
Read More
cyber security for law firms

Cyber Security for Law Firms

Cyber Security for Law Firms : 15 Essential Controls 1. Implementing Strong Password Policies and Multi-Factor Authentication Password security is a fundamental aspect for all businesses to undertake.  Implementing strong password policies, such as requiring complex passwords and regular password changes, can help prevent unauthorised access to sensitive information. But a single password on its…
Read More
Australian Data Privacy Reforms

Improve your Data Security and Privacy : Six Step Process

Australian Data Privacy Act Reforms – Aug 2024 The Australian Data Privacy reforms are about to come into affect at the end of August 2024.  So there has never been a better time to get your organisations’s data security and privacy controls in check than now! If you missed what the reforms are about here…
Read More
Virtual CISO Services

What is a Virtual Chief Information Security Officer?

Bringing Cybersecurity Expertise to Your Business: The Power of a Virtual Chief Information Security Officer In today’s rapidly evolving digital landscape, businesses are faced with an increasingly complex and sophisticated range of cybersecurity threats. Protecting sensitive data, mitigating risks, and ensuring compliance have become vital priorities for organisations of all sizes. Enter the Virtual Chief…
Read More

Cyber Incident Response | What Law Firms need to know

🔒Choosing the right Incident Response Service for your law firm is not just a decision, it’s an investment in your firm’s future.🔒 In the current cyber landscape, small businesses are no longer immune to the threats that were once only a concern for big corporations. Each day we see how cyber threats are becoming more…
Read More
Cyber Security for Law Firms

Cyber Security for Law Firms: What you need to know

Introduction: Cyber Security for Law Firms In today’s threat landscape, protecting sensitive client information has become a critical concern for law firms around the world. With cyber threats on the rise, it’s imperative for legal professionals to have a comprehensive understanding of cyber security measures to safeguard their firm’s data and reputation. This guide aims…
Read More
Cyber Incident Response Plan

How to create a Cyber Security Incident Response Plan

Creating an Effective Cyber Security Incident Response Plan In today’s digital landscape, no organisation is immune to cyber threats. That’s why having an effective cyber security incident response plan is crucial. It not only helps you prepare for potential security incidents but also minimises their impact, allowing you to bounce back quickly. In this article,…
Read More
Incident Response Plan

How to Create an Effective Incident Response Plan to Protect Your Business

In today’s digital age, incidents and data breaches are becoming increasingly common. To protect your business from the potential damage caused by these incidents, it is essential to have a robust incident response plan in place. This article will guide you through the process of creating an effective incident response plan that can help minimize…
Read More

Newsletter Archive

Are you prepared for a cyber attack?

Find out how Cyooda Security can help improve your firm's security culture, recognise threats, strengthen defences and improve your overall cyber resilience.