Cyber Security Services

Cyberburst provides cyber security solutions for businesses that protect you and your business’s data. We recognise the trust you place in us to keep your data safe and prioritise the security of our platform, ensuring we comply with and exceed the highest cyber security standards in Australia. And we take that responsibility seriously. 

Cyber security compliance standards we uphold  

Cyber security isn’t just something we upskill companies in  — it’s something we practise ourselves. We strive to uphold cyber security compliance standards that guide and strengthen our commitment to protecting your business and data, namely:

SOC2 Type 2 attestation

SOC 2 Type 2

Cyberburst is continuously audited against SOC 2 Type 2 by auditors AssuranceLab and uses Drata, a continuous compliance platform, to manage and monitor SOC 2 Type 2 controls, policies, and vendors.

Encryption

Data is encrypted in transit and at rest using industry-standard protocols (TLS/SSL for data in transit and AES256 for data at rest).

Data security

We store your data in the cloud with Amazon Web Services (AWS), which has strong controls on data centre security. Cyberburst employees are trained in security best practices and can only access the data they need to do their jobs (Principle of Least Privilege).

Permissions and account security

Cyberburst allows customers to assign different roles to administer training, manage teams or groups, or access learning. SSO and MFA options are available to secure customers’ accounts.

Secure development and releases

Security is considered at all stages of our software development. Cyberburst code releases are peer-reviewed and tested before release, including manual and automated checks. We also review updates in development and staging environments before releasing them to production.

Monitoring and resiliency

Cyberburst takes a proactive approach to the cyber security threat monitoring of our systems. We use centralised logging, metrics and automatic team alerts to monitor security and system events. We proactively take a thorough approach to detecting vulnerabilities including conducting an annual third-party penetration test.

Cyberburst — helping businesses navigate cyber security standards in Australia

If you have any questions about the measures we implement, please get in touch. If you’d like to know more about our human-centric cyber security solutions for businesses or discuss pricing and packages, we’d love to chat about those, too.

Frequently asked questions

What cyber security standards does Cyberburst follow?

Cyberburst has detailed security policies and controls, which have been externally audited and received SOC2 Type 2 attestation.

Where do you store my data?

We store data in the cloud on Amazon Web Services (AWS). Cyberburst’s AWS servers are located across multiple availability zones in Australia. AWS shares responsibility for some aspects of the system’s security, such as the physical security of data centres. More information can be found here about AWS’s controls to keep its data centres secure.

Where can I find Cyberburst’s Privacy Policy and Terms of Use?

You can find our Privacy Policy and Terms of Use here.

Who can I speak to if I want to learn more or have a security concern?

You can email security@yarno.com.au, and we will get back to you as soon as possible.