Cyber security protections should be the number one priority for legal, accounting or financial services firms in Perth. With ransomware, hacks, attacks, vulnerabilities and data theft affecting professional services firms and businesses all around the world on a daily basis, it’s just a matter of time before your legal, accounting or financial services practice is hit. My Info Tech Partner's goal is to provide you with the best cyber security protection possible, while also keeping your unique needs and budget in mind.

Hacks & Attacks

These days, hackers, attackers, nation state actors and even automated web bots are all trying to gain access to your network and ultimately access your private client or customer and practice information. When successful, the attackers can lock down your data or worse they can release your client or customer information to the world.

With the sheer number of security threats faced by firms, it is important to evaluate the vulnerabilities that may affect your legal, accounting or financial services firm. Lost revenues due to downtime or large fines due to data breaches may not be an option and could affect the overall health of the organisation, potentially ending in bankruptcy for the firms equity principals, partners or directors and lost jobs for the firms employees.

Stats show that 60 percent of small businesses that suffer a cyber attack, are out of business within 6 months of the attack. According to Deloitte, 90 percent of costs from a cyber attack occurring beneath the surface, and it takes up to 5 years after the attack to fully recover, naturally, it’s easy to see how this happens.

Further with the IBM and Ponemon Institute Cost of Data Breach study in 2020, the average cost of a cyber attack is US $1,520,000. In a real world example that we are aware of, an organisation suffered a ransomware attack that found all the copies of their backups and deleted them. This organisation was then forced to pay a ransom, of US $250,000, just to get their data back. Obviously, and it goes without saying, this was just the start of the costs to the organisation. Once they were operational again, they calculated the business they lost due to the ransomware attack, was over US $4,400,000 in sales.

I think we can all agree, that’s a lot of money, isn’t it. Would it be inconsiderate to ask, do you think your firm could survive that kind of loss?

Internal Threats

Not only is it necessary to protect your firm from outside threats but internal threats can also be a huge vulnerability. Part of a thorough cyber security plan is ensuring that employees are using best practices and are educated on their role in keeping themselves, the firm and its clients safe.

Compliance

If you store customer data, private information, or take credit cards, cyber security is no longer an option, but instead is a necessity. Not to mention the Australian Privacy Act, Notifiable Data Breach Scheme amendments or any other regulations, you need a team that understands these requirements and a team that can provide the pieces necessary to keep you compliant.

How Can We Help?

Protecting your reputation, livelihood, information and your client or customers’ data is My Info Tech Partner's specialty.

  • Evaluate and Assess - We can evaluate and assess your current practice or firm environment for it’s overall security health.
  • Connect and Review - We work one-on-one with your team to ensure your cyber security goals are achieved at a reasonable budget given your firm’s risk level the damage that can be caused.
  • Implement and Protect - Implement a complete ongoing cyber security plan to provide a comprehensive cyber security solution that will protect your interests and ensure your cyber liability insurance will pay out in a claim.

Why Should You Work With Us?

  • We aren’t afraid to put our money where our mouth is and offer our “Never Pay The Ransom” guarantee which you can read more about on our homepage.
  • We practice what we preach by investing into protecting our own business from cyber attack. The benefit to you is, it’s highly unlikely we will be the cause of a cyber attack that affects your reputation, livelihood and professional services firm.
  • We will have straight up, tough, honest conversations with you when we believe you’re acting against your best interests.
  • We believe in investing in quality products and services that have a great reputation and deliver results.
  • We have a proven track record when it comes to mitigating or preventing cyber attacks and aren’t afraid to admit our mistakes when they happen.
  • We have heavily experienced team members, who know what it feels like to suffer a cyber attack, backed up with industry certifications such as the Certified Information Systems Security Professional (CISSP) from ISC2.
  • We only use suppliers or vendors who we can rely on to get the job done right.
  • We meet with you regularly to check in with how your firm is going and apprise of you changes in the industry, the rapidly evolving cyber security threat landscape, that you need to be aware of, and what we are doing to solve it.
  • We have access to a network of resources such as the Australian Cyber Security Centre (ACSC) Joint Cyber Security Centre (JCSC) network, run by the Australian government, to help out when something is outside our direct expertise.

The benefit to you of all this is

  • Your reputation and livelihood are protected.
  • Which allows you to focus on practicing your profession, serving your clients and growing your professional services firm.
  • Naturally, and it goes without saying, all of this leaves you to sleep better at night.

Our company is the leader in cyber security services. Call us today on 08 6244 2556, for your initial consultation, to start your journey towards a more prosperous future.

Frequently Asked Questions

As the equity principal, partner or director, do I have to be involved in the meetings or diagnostic assessment?

Yes. The primary reason you need to be involved is that we ask a lot of business questions that your team may not know the answer to. Further, when a cyber attack or security incident occurs, ultimately you are responsible. This is not something you can just hand off to your practice manager or IT manager. I’m not saying they should not be involved, they absolutely should. This is not something you can abdicate; you must be involved fully in the process.

Just as you would be if you were meeting with your accountant to review your firm’s financial position or conduct tax planning or your financial planner with regards to your personal financial position.

Why can’t I just have you deploy one off project e.g. implement firewall or antivirus software?

While we can do one off projects, it has been our experience, they don’t provide you enough value. Also firewalls today need regular monitoring, maintenance and updating, so its better there are ongoing services in place that allow for this in one fixed monthly amount, rather than the maintenance not getting done at all or very sporadically.

Why do I need to deploy layers of cyber security services?

Think of it like the defensive security layers in a castle. These are all designed to protect the inhabitants of the building from armies attacking. Each defensive layer is designed to provide protection, however if it fails, for whatever reason, there are many more behind it, to ensure you don’t fall victim.

Why do you need to monitor our entire systems 24x7x365?

Hackers and cybercriminals are known for attacking during weekends, public holidays and even in the early hours of the morning when they know its less likely someone is watching. Without 24x7x365 security monitoring and response, it’s almost impossible to detect their activity. Naturally, the quicker you can detect their activity in your system, the quicker you and us can respond and take action to remove them before they cause you catastrophic consequences to your reputation, you and your family’s livelihood.

Why do you need to do a diagnostic assessment of my systems before you provide me recommendations?

Just like a doctor isn’t going to give you their advice before being sure exactly what your problem is, likely sending you for a blood test or X-Ray and whether their prescribed fix will actually help, neither can we. We might overestimate your needs or underestimate them, and then we look foolish and you’re not happy.

We always run a diagnostic assessment, so we understand the true state of your systems and combine this with our proprietary approach to truly understand your needs before making any recommendations.

I KNOW things are screwed up and I’m embarrassed to have someone review us. Is this truly confidential?

Let us assure you that no one gets a “perfect” score, and everyone we’ve done an assessment on has uncovered problems, security shortfalls and a host of things that need to be addressed. Let me personally assure you that WE WILL NEVER BLAME YOU OR MAKE YOU FEEL EMBARRASSED. It’s absolutely NOT your fault that cybercriminals have become as sophisticated and aggressive as they have been. You shouldn’t have to do this – but the reality is if you don’t, you will get compromised. At that point, employees, clients, competitors and the federal government will be on the warpath to blame you. By doing this assessment and then addressing any security issues found, you are demonstrating a “good faith” effort in attempting to protect their data.

Further, if you are trusting an outsourced IT company, you shouldn’t feel bad or embarrassed to have their work checked. Fresh eyes always see things they cannot for being too close. And finally, everything we discover and discuss is completely confidential.

Our goal is to protect hardworking professional services firm practice managers, principals, partners and directors like you from the cyberscum robbing unsuspecting businesses blind or severely crippling or harming them and their livelihoods.

I don’t have a server in my office; is an assessment still worth doing?

ABSOLUTELY! In fact, organisations without a server are at a higher risk of becoming a victim of a cyber-attack, particularly if the phones, laptops and tablets are used by remote employees who might also use those devices for personal use.

Most of our “stuff” is in the cloud. Do I need to worry about doing an assessment?

Yes, cloud applications are just as insecure as those installed in your office. In fact, because you have more control over the security of your office, they may be less secure. Further, the DEVICES connected to your cloud applications must be scanned for vulnerabilities, particularly if the people using them may also use them for personal e-mails, web surfing, etc.

Should I have my current IT person/company involved? What if I DON’T want them to know you’re doing this?

It’s entirely up to you whether or not we work with your current IT person or company. We are here to work for YOU and sit on YOUR side of the desk, so we can work with them or keep this process confidential.

However, keep in mind that some IT companies (outsourced) or people (employees) may feel threatened and retaliate. They might try to cover up their mistakes or do things to prevent the assessment from being completed, such as refusing to give you your network password, refusing to complete the surveys or falsifying information (saying they have it covered, invalidating the reports, etc.).

To that end, if you DO want us to work with them, we need your full support and the ability to alert you to anything that is blocking us or preventing us from honestly and candidly conducting the assessment. Again, we are sitting on your side of the desk to shine a spotlight on where you’re being underserved, or where you are exposed to threats that can have a significant, negative impact on you and your firm.

Most people want us to conduct this assessment without their IT person or company knowing. In some cases, they are outsourcing their support and are not happy with the service they are getting and feel there are things NOT being done that should be done. In that case, we can conduct this completely under the radar.