Industry News

Do you reuse the same password like Mark Zuckerberg did? Here’s a lesson from recent history that is worth bearing in mind the next time you have to set a password. Humans are creatures of comfort. Through our everyday decision-making we actively avoid making our lives more difficult, and that’s not a bad thing… generally.

READ MORE

What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been

READ MORE

In the modern world, the likelihood of data breaches and security threats is ever-increasing. Email, in particular, is the leading threat vector for ransomware, phishing, data theft and other attacks. Unfortunately, most businesses simply don’t have the time or the resources to come up with solutions to address these threats – as a result, they

READ MORE

Gone are the days of the benign Nigerian prince sending poorly worded emails that promise recipients untold millions just ripe for the taking … or so we thought. Decades after swindling countless victims around the world, the Nigerian Prince variant of phishing emails continue to lure the unwary. In fact, the classic bait-and-hook scam still

READ MORE

When was the last time you evaluated the efficiency of your business processes? And what about the last time you researched how the latest technology could help you to gain competitive advantage while reducing cost? Like many businesses, your answer is probably along the lines of ‘not sure’ or ‘can’t remember’. If you want to

READ MORE

Australian businesses can no longer ignore the financial threat posed by major data breaches. Cyber insurance is becoming increasingly relevant to all levels of business in Australia, and you should expect that premiums will soon be affected by conformance (or non-conformance) to a standard set of data security policies. A serious data breach in your

READ MORE

We recently completed an information security audit for one of our professional services clients that centred around penetration testing – the simulation of a series of attacks intended to reveal weaknesses in the client’s network so they can be remedied before a real-life attacker exploits them. The study took three weeks to execute in full

READ MORE

American security company Symantec boasts one of the most comprehensive repositories of cybersecurity threat intelligence in the world. The company has released their annual report that highlights trends in the cybercrime threat landscape. We have summarised three of the most relevant findings from the perspective of medium and large businesses. You can download the report

READ MORE

IT News reports that last week an IT Manager at Collins Foods, operators of hundreds of KFC stores across the world, accidentally clicked on a malicious link in an email, allowing hackers to briefly take over his or her email account and issue fake invoices to contacts. It’s an illustration of how quickly attackers can

READ MORE

ARN reports that the Office of the Australian Information Commissioner (OAIC) has received 31 data breach notifications in just the first three weeks since Australia’s Notifiable Data Breaches Scheme came into effect on February 22nd. This says a few things: Australian businesses are taking their data privacy obligations seriously.  The immediate steady stream of notifications

READ MORE