Blog

cyber security

Cythera Co-Founder and Director Craig Joyce shares why he stands for Cyber Security in Australia.

Craig Joyce has a strong reputation for his work in providing senior leaders in Australia with counsel on all matters relating to IT.

Craig has helped countless businesses thrive under varying conditions and across manufacturing, retail and technology sectors, also lending his focus to new businesses that need the right IT tools and advice to grow.

Read More »
cyber security

How secure is your business from cyber-attack?

There are two common answers to this question; 1) I don’t know. 2) I think we’re secure.

Either answer is unlikely to tell you much about your business cyber readiness, but to be fair it’s not an easy question to answer. There is a lot to know about cyber-security and the threats you will face before you can effectively start to defend your business.

Read More »
cyber awareness

If I had a dollar to spend in cyber security…

The 2018 OAIC data breach statistics revealed that over 75% of successful security breaches start with human error. The most common cyber attacks come in the form of malicious emails sent to unsuspecting employees, meaning employees are literally the first line of defence.

Read More »
managed security

Why should you be considering an MSSP?

A Managed Security Services Provider (MSSP) allows a business to selectively consume externally provided cyber security services to meet the business objectives of your organisation. Here at Cythera we have built a wide range of services and platforms that our customers can consume on a monthly basis, allowing for business to consider contracting security services rather than managing them in-house (or worse, doing nothing at all.)

Read More »
security assessment

I don’t know what I don’t know.

In Information Technology our businesses are often very project driven; “We need a new endpoint solution”, “We need to look at life-cycling our wireless”, “Our company needs a risk management platform”. In cyber security, this approach often leads to our clients ‘not knowing what they don’t know’.

Read More »
breach

The Financial Impact Of Breaches

Often, when we are presenting the state of the cyber security landscape and the risks that unprepared customers expose themselves and their businesses to, we get a real sense that customers nod but don’t really appreciate the gravity of the reality. Seeing statistics on a page and bridging that to a scenario that they can wrap their heads around and relate to their business is hard. Too regularly we have to see a customer being impacted themselves before they realise the magnitude of the danger to their business and their staff that a cyber attack brings.

Read More »
breach

The Financial Impact Of Breaches

Often, when we are presenting the state of the cyber security landscape and the risks that unprepared customers expose themselves and their businesses to, we get a real sense that customers nod but don’t really appreciate the gravity of the reality. Seeing statistics on a page and bridging that to a scenario that they can wrap their heads around and relate to their business is hard. Too regularly we have to see a customer being impacted themselves before they realise the magnitude of the danger to their business and their staff that a cyber attack brings.

Read More »
cyber crime investigation

Reporting A Cyber Incident

One common question we get asked by customers who have been on the receiving end of a cyber incident, is how to go about reporting the incident to authorities. Many of us are well aware of the avenues to take when we are the victim of common crimes like theft or criminal damage, but what’s less clear is how to go about reporting incidences of cyber-crime.

Read More »
computer virus

EvilClippy and the rise of Office based malware.

Last month a cross-platform assistant for creating malicious MS Office documents, named EvilClippy was released.

It allows an attacker to hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools.

Attackers can now hide malicious code from anti-virus and macro analysis tools by leveraging undocumented features in the way macros are stored within an office file.

Read More »
By using this website, you agree to our use of cookies. We use cookies to provide you with a great experience and to help our website run effectively. You can read our cookie policy here.