Uncategorised

Melbourne’s Cyber Risk brings BlackBerry Cylance to Reece Group

Melbourne’s CyberRisk brings BlackBerry Cylance to Reece Group Melbourne-based security consultant CyberRisk has scored a consulting gig with Australian plumbing and bathroom supplies distributor Reece Group. The deal centres around Reece’s adoption of BlackBerry Cylance’s platform, with Cyber Risk advising on tuning in best operational practices, developing the zones and policies before deployment, and contributing […]

Uncategorised

CyberRisk Managed Security Services

Melbourne, 14 April, 2020 – CyberRisk is a leading Australian managed security services provider (MSSP) offering outsourced monitoring and management of security devices and systems. CyberRisk offers services to manage vulnerability scanning, security awareness, security monitoring, network detection, deception, endpoint visibility, and anti-malware systems. Our 24 x 7 Australian based Security Operation Centre or SOC provides customers with state of […]

Uncategorised

Case Study: CyberRisk, Reece Group and BlackBerry Cylance

CyberRisk is focused on continuous innovation, exceptional service delivery and great customer experience. We help our customers to simplify their security operations and strengthen their defences against cyber threats. Delivering fantastic outcomes for our customers is what drives us every day. Our experience with implementing and running security solutions has provided us with the hands […]

Uncategorised
Cyber Risk CRN Fast 50 2020 Award

CyberRisk placed #19 in CRN Fast50 2020

The CRN Fast50 recognises the fastest-growing companies in the Australian IT channel, based on year-on-year revenue growth. CyberRisk was the highest placed dedicated cybersecurity company coming in at number 19! We are honoured to appear in the 2020 CRN Fast50, the 12th annual recognition of Australian IT companies that have achieved remarkable growth. A big […]

Uncategorised

Mandatory Data Breach Reporting

An entity that is required to comply with the Privacy Act 1988 must take reasonable steps to protect the personal information it holds from misuse, interference and loss, as well as unauthorised access, modification or disclosure.  This extends to situations where an entity engages a third party to store, maintain or process personal information on its behalf. […]

Uncategorised
Cylance Partner of the Year - Cyber Risk

CyberRisk Named Cylance ANZ Partner of the Year 2017/18

Melbourne, 9th of April, 2018 – CyberRisk, one of Australia’s leading information security, technology risk management and privacy consulting firms has been named as the Cylance ANZ partner of the year 2017/18. Cylance Inc., is the company that revolutionised the antivirus and endpoint protection industry with true AI powered prevention that blocks malware, fileless attacks, and […]

Uncategorised

CyberRisk Services

At CyberRisk we believe that protecting your organisation’s reputation is crucial in ensuring that your business continues to grow and meet its objectives. We provide you with expert advice to protect your organisation and its reputation from cyber-attacks. Safeguarding your business is our one mission and goal. We do this by leveraging years and years […]

Uncategorised

What is Penetration Testing?

In a nutshell, a penetration test otherwise known as a “pen test”, is a way of testing your organisation’s security posture. Penetration testing simulates an attack on your systems using real world tactics, techniques and practices in order to discover any vulnerabilities before the bad guys do. Pen testing answers the question: “Can a hacker […]

Uncategorised
Crest Partner - Cyber Risk

CyberRisk is now a CREST Registered Tester

Melbourne 6th of July 2019 — CyberRisk, one of Australia’s leading information security and technology risk management consulting firms today announced that it is a CREST Registered Tester. CyberRisk performs technical security assessments to test the security posture of an organisation, including networking devices, web applications, mobile applications, wireless systems and IT infrastructure both on premise and […]