While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose.
In an evolving cyber security landscape, businesses are searching for means to proactively mitigate the threat of network compromise. While large enterprises are able to hire permanent Chief Information Security Officers to enact overarching security plans, the salaries commanded by CISOs mean they are often out of reach for medium-sized businesses. Smaller organisations are now
The future of information technology is a moving target. New technologies play an ever-increasing role in how our businesses operate, and services and demands can change at an alarming rate. We have made four speculations on the future of IT consulting in Australia’s business landscape. Cyber Security Will Become a Primary Focus for Organisations Organisations
Application Whitelisting has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to protecting your digital assets, well-executed application
One of the more valuable services offered by a managed services provider (MSP) is continuous vulnerability monitoring. It’s an ongoing security process that forms a major pillar of a complete security program. Four important processes underpin continuous vulnerability monitoring: Discovery, Reporting, Prioritisation and Response. Each of these processes must work continuously and in unison to
In the battle against cyber fraud and identity theft, we consider programs capable of machine learning to be vital in mitigating risk. Essentially, machine learning is a form of artificial intelligence written into software that can predict accurate outcomes based on detailed analysis of past events. By building algorithms that can apply statistical analysis to
When it comes to internet security, the professionals seeking to keep transactions secure can often only be reactive to hackers. New concepts are often introduced, but one that is gaining momentum with IT consultants is blockchain technology. Blockchain was introduced in 2008 and incorporated into the management of BitCoin transactions the following year, but many
We know cyber fraud and identity theft to be common threats in the digital age, but the scale of the problem in Australia might come as a shock. A 2016 report from the Australian Competition And Consumer Commission found that Australians were defrauded out of $300 million in 2016, with 40 per cent of that
Defeating Ransomware, Advanced Persistent Threats and Malicious Insiders In late July our Managing Director, James Walker, teamed up with our network security partner, Cisco, to deliver a webinar on upgrading network security. We addressed three specific threats: Ransomware, Advanced Persistent Threats (silent malware that is designed to sit undetected on your network for as long
MSP Mentor’s list of the 501 best MSP’s in the world has been published for 2017 and Computer One made the list in a strong place yet again. This year’s rank was 310th. It’s impressive considering 429 places are taken by US and Canadian companies, with just a handful of rankings going to international businesses.
The latest study released by the Ponemon Institute says that nearly 8 in 10 IT decision-makers think it’s anywhere from “somewhat likely” to “certain” they’ll suffer a data breach as a result of IoT in the next two years. That’s a massive admission of fear about the downside of this new wave of technology. It
The American restaurant chain, Chipotle, suffered a 3-week infection of its POS systems from March 24 to April 18 this year. Customer’s credit and debit card information was stolen during the breach, which was first disclosed on April 25. Read the detailed story at ITNews. The stolen information could be used to create clone cards, drain
Shadow Brokers, an unidentified group of hackers popped up nine months ago claiming to have stolen the secret hacking techniques of a group linked to the American NSA. They provided some workable samples of exploits and tried to sell their treasure trove for up to 1 million bitcoins (A$72.5 billion as at 11/3/21). When no
According to IT News, transport giant Toll has received permission to inspect the contents of 8 USB devices it suspects were used to illegally copy its intellectual property by an ex-employee. Currently locked in a legal stoush with the former National Sales Manager for subsidiary NQX, Toll alleges that in the days immediately before his
Hot on the heels of the Mirai botnet of 2016 comes news of a new IoT malware, dubbed Hajime. As reported in Computerworld, Hajime is “like Mirai on steroids” with a more sophisticated method for command and control of compromised IoT devices based on a peer-to-peer network rather than a direct server connection. Estimates so