Skip to content
Change industry

You said ·  We had a security incident

Industry ·  Finance, advisers, accountants, AFSL

The breach happened. Now we fix the door.

You just saw the invoice redirection email or the failed login alert. In financial services, the first sixty minutes determine whether this is a manageable incident or a regulatory catastrophe. The priority is containment, not explanation. Your licensee, your insurer, and APRA all need facts, not speculation. We start with the technical evidence before anyone drafts a response.

What this usually looks like

What a breach looks like for an Australian financial firm.

The initial vector is usually a compromised broker portal, a phishing email targeting XPLAN or Iress credentials, or a BEC attack on an SMSF administration payment. The data involved covers client identities, financial positions, and superannuation details. This triggers mandatory notification obligations under the Privacy Act and potentially AUSTRAC Tranche 2 requirements.

Your licensee is asking for a root cause analysis within 24 hours. Your cyber insurer is demanding forensic evidence before authorising recovery costs. You are juggling Xero or MYOB access, client communications, and the need to preserve logs from your MSP or cloud provider. Panic leads to poor decisions.

The vulnerability is rarely the technology itself. It is usually a gap in identity management, a missed patch, or a lack of segmentation between your admin network and client data. The fix requires more than a password reset. It demands a verified recovery path and proof of control for your next audit.

Where we'd start

Where we start after the incident.

  1. Step 01

    Contain and verify the scope

    We isolate affected endpoints and revoke active sessions for XPLAN, Iress, Class Super, and banking portals. We preserve email headers and proxy logs for forensic analysis. We confirm whether data exfiltration occurred before we touch anything else. This step stops the bleeding and gives you accurate data for your licensee report.

  2. Step 02

    Restore clean operations

    We rebuild compromised accounts from verified backups, not from the infected state. We enforce MFA on all financial platforms and reset credentials for the entire team. We verify that the backdoor, usually a rogue app or persistent credential, is removed. We test access with your core tools before handing the keys back to you.

  3. Step 03

    Document for compliance and insurance

    We produce a technical incident report that meets APRA CPS 234 standards. We outline the specific controls that failed and the remediation steps taken. This document supports your insurer claim and satisfies your licensee's annexure requirements. We also adjust your monitoring rules to detect this specific attack pattern again.

CCP's security floor

Every CCP client is covered by the Client Security Baseline.

The CSBO is our contractual security floor. MFA on everything that matters. Application control. Vulnerability management. Backups restored, not just scheduled. Account offboarding the same day someone leaves. Password management staff will adopt. Annual awareness training.

If you won't do the basics, we'd rather decline than take responsibility for an incident you chose to ignore.

  • Multi-factor authentication

    Phish-resistant MFA on everything that matters.

  • Application control

    Allowlisted applications. Nothing else runs.

  • Vulnerability management

    Known vulnerabilities remediated inside thirty days.

  • Tested backups

    Backups that have actually been restored, not just scheduled.

  • Same-day offboarding

    Account access cut the day someone leaves the business.

  • Password management

    A password manager your staff will actually use.

  • Awareness training

    Annual cybersecurity training. No one opts out.

  • The full baseline

    Eleven controls in total. Seven shown here. See what's included in Managed IT Complete.

Track record

Twenty years in. A hundred-plus clients. The numbers are load-bearing.

Years in business
0+
Loved clients
0+
Aussie techs
0%

4.8 average · 46 reviews on Google

“The new investors are making us offshore IT. It sucks. You guys were perfect. I don't want to change.”
Paraphrased. A client forced to leave after an acquisition.

Our clients measure their tenure with us in years, not renewals. When they do have to leave (almost always because they've been acquired), they're sad about it. That's the metric that matters.

“Night and day working with CCP. They came in from day one, spent the time to ensure everything was set up and secure properly, and now everything just works. Due to the success we've had with them, we further engaged them to manage our phone systems and website. If you work with CCP you will never have to worry about your IT systems again.”
Trent Martin Google review
“We have been using CCP since the early 2000s and have always had great service on our 20-plus PCs and server. We recently moved to a managed service and cannot rate the experience highly enough. Well done Lee and team.”
Kelvin Mansfield Flexi Google review
“We have been continually impressed with CCP over the several years we have used them. They are extremely efficient, excellent customer service and well priced. I would recommend Lee and his team.”
ProcessWorx HR consulting, Perth Google review

The qualifier

Let's see if we're a fit.

Seven questions, one moment of your time. We'd rather tell you now than three months in.

Step 1 of 7

How big is your team?

Counting everyone: staff, contractors, anyone with an account.

See if we're a fit