Skip to content
Change industry

You said ·  We had a breach or close call

Industry ·  Health and aged care

We need to recover from a breach or close call now.

A breach in health or aged care is not just a technical failure. It is a regulatory event with immediate obligations to the Office of the Australian Information Commissioner, the Aged Care Quality and Safety Commission, and the NDIS Quality and Safeguards Commission. The first hour determines whether you contain the damage or watch it spread through your practice management platform. We focus on stopping the bleed, verifying backup integrity, and restoring normal operations without repeating the mistake.

What this usually looks like

What a breach looks like in your practice.

The incident usually starts with a phishing email that bypasses your gateway, a compromised vendor account, or a misconfigured cloud share. The attacker gains access to patient records, financial data, or operational systems. In a clinic with 20 to 250 staff, the lateral movement is fast. You might notice the delay when invoices are redirected or when a GP finds their patient notes altered.

The pressure comes from multiple regulators. You must report eligible data breaches under the Privacy Act within 30 days. The Aged Care Quality and Safety Commission requires immediate notification of serious incidents. NDIS providers face strict safeguarding obligations. Your cyber insurance policy will demand evidence of your incident response plan and your backup restoration capabilities.

Most practices do not have the bandwidth to investigate this internally while trying to see patients. The risk of reinfection is high if the initial vulnerability remains open. You need an external team that understands the specific tools you use, such as Best Practice, Medical Director, or ZedMed, and the sensitive data they hold.

Where we'd start

Where we start immediately.

  1. Step 01

    Contain and assess the scope

    We isolate affected endpoints and revoke compromised credentials within minutes. We analyse the attack vector to determine if the threat actor is still inside your network. We check your practice management platform, email archives, and shared drives for signs of data exfiltration. This step stops the spread and gives you a clear picture of what was exposed.

  2. Step 02

    Verify and restore from clean backups

    We do not trust your last backup without testing it. We verify the integrity of your backups before initiating any restoration. We restore your systems to a known good state, ensuring that no malware or backdoors remain. We prioritise the restoration of critical clinical and financial systems to get your practice running again.

  3. Step 03

    Harden and report

    We implement immediate controls to prevent recurrence, such as enforcing MFA on all admin accounts and patching the specific vulnerability exploited. We assist you with the required regulatory notifications, providing the technical evidence needed for the OAIC and other bodies. We then review your security posture to address gaps in identity management and email security.

CCP's security floor

Every CCP client is covered by the Client Security Baseline.

The CSBO is our contractual security floor. MFA on everything that matters. Application control. Vulnerability management. Backups restored, not just scheduled. Account offboarding the same day someone leaves. Password management staff will adopt. Annual awareness training.

If you won't do the basics, we'd rather decline than take responsibility for an incident you chose to ignore.

  • Multi-factor authentication

    Phish-resistant MFA on everything that matters.

  • Application control

    Allowlisted applications. Nothing else runs.

  • Vulnerability management

    Known vulnerabilities remediated inside thirty days.

  • Tested backups

    Backups that have actually been restored, not just scheduled.

  • Same-day offboarding

    Account access cut the day someone leaves the business.

  • Password management

    A password manager your staff will actually use.

  • Awareness training

    Annual cybersecurity training. No one opts out.

  • The full baseline

    Eleven controls in total. Seven shown here. See what's included in Managed IT Complete.

Track record

Twenty years in. A hundred-plus clients. The numbers are load-bearing.

Years in business
0+
Loved clients
0+
Aussie techs
0%

4.8 average · 46 reviews on Google

“The new investors are making us offshore IT. It sucks. You guys were perfect. I don't want to change.”
Paraphrased. A client forced to leave after an acquisition.

Our clients measure their tenure with us in years, not renewals. When they do have to leave (almost always because they've been acquired), they're sad about it. That's the metric that matters.

“Night and day working with CCP. They came in from day one, spent the time to ensure everything was set up and secure properly, and now everything just works. Due to the success we've had with them, we further engaged them to manage our phone systems and website. If you work with CCP you will never have to worry about your IT systems again.”
Trent Martin Google review
“We have been using CCP since the early 2000s and have always had great service on our 20-plus PCs and server. We recently moved to a managed service and cannot rate the experience highly enough. Well done Lee and team.”
Kelvin Mansfield Flexi Google review
“We have been continually impressed with CCP over the several years we have used them. They are extremely efficient, excellent customer service and well priced. I would recommend Lee and his team.”
ProcessWorx HR consulting, Perth Google review

The qualifier

Let's see if we're a fit.

Seven questions, one moment of your time. We'd rather tell you now than three months in.

Step 1 of 7

How big is your team?

Counting everyone: staff, contractors, anyone with an account.

See if we're a fit