Phishing, Spear-Phishing and Whaling – What’s the Difference?

Gone are the days of the benign Nigerian prince sending poorly worded emails promising you untold millions. Cyber attackers have amped up their approach to malicious emails, combining highly personalized approaches with expertly designed corporate email spoofs. These emails are known as ‘Whaling’ and are the close, more sinister cousin of ‘Spear Phishing’. They’re now a very real threat to Australian businesses.


Get Your Strategic Digital Transformation Underway with Computer One

digital transformation consulting

When was the last time you evaluated the efficiency of your business processes? And what about the last time you researched how the latest technology could help you to gain competitive advantage while reducing cost? Like many businesses, your answer is probably along the lines of ‘not sure’ or ‘can’t remember’.


The Rise of the Guest Network. How we Predict Threats and Restrict Information Access based on Device Types and Users

Did you know that many threats to your information security can be mitigated by good network design? Read more about the work we do.


The Staggering Cost of NotPetya Infection: DLA Piper and TNT Still Reeling from Avoidable Breaches

NotPetya

It’s been about a year since NotPetya hit, taking several large businesses offline and wreaking havoc from an operational standpoint.


Expect this Change in Cyber Insurance over the next 5 years

Australian businesses can no longer ignore the financial threat posed by major data breaches. Cyber insurance is becoming increasingly relevant to all levels of business in Australia, and you should expect that premiums will soon be affected by conformance (or non-conformance) to a standard set of data security policies.


A Lesson from Real Life Security Consulting

Does your firm suffer this information security issue?


2018 Internet Security Threat Report Details Rise of Cryptojacking and Supply Chain Attacks

managed IT services 2

American security company Symantec boasts one of the most comprehensive repositories of cybersecurity threat intelligence in the world. The company has released their annual report that highlights trends in the cybercrime threat landscape.


Centrepoint Finance endorses Computer One’s Services

In this new video Megan Muggleton, Chief Technology Officer, talks about the relationship between Centrepoint Finance and Computer One


It happens to the best of us: how would you detect a data breach?

IT News reports that last week an IT Manager at Collins Foods, operators of hundreds of KFC stores across the country, accidentally clicked on a malicious link in an email, allowing hackers to briefly take over his or her email account and issue fake invoices to contacts. How would you spot such an attack in progress?


31 Data Breach Notifications in 3 Weeks under New Scheme

In just 3 weeks the Notifiable Data Breaches Scheme has received 31 notifications. Is your firm prepared for the possibility?