CYTER
  • Home
  • What Is CYTER?
  • What We Do
  • Forensic
  • Analytics
  • Cyber
  • Technology Disputes
  • About Us
  • Contact Us
CYTER
  • Home
  • What Is CYTER?
  • What We Do
  • Forensic
  • Analytics
  • Cyber
  • Technology Disputes
  • About Us
  • Contact Us

CYBER

CYTER Cyber helps organisations to be cyber ready and to respond to suspected cyber incidents in a timely manner.


Conduct cyber investigations into a suspected cyber intrusion


Conduct cyber forensics to establish:

  • Method of compromise or exploitation
  • Attack vectors
  • Active malware infections
  • Presence of root kits or backdoors
  • System weaknesses


Conduct forensic assessment of Business Email Compromises by:

  • Analysing email communications
  • Analysing audit log files
  • Establishing the extent of the compromise
  • Evidence of fraud / third party social engineering activity linked to the business email compromise


Provide independent overwatch for internal IT investigations following suspected system compromise


Prepare reports and assessments for use by boards, risk committees and insurers


Provide cyber awareness training


Assist with the creation or assessment of a cyber incident response plan

Contact Us

Copyright © 2017 - All Rights Reserved.


Cyter Pty Ltd (AU) - Cyter Limited (NZ)

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close