Tag Archives: application whitelisting

Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

According to Verizon’s 2018 Data Breach Investigations Report, 92.4% of malware is delivered by email. Up until now, phishing emails have been easy to spot because they come from suspicious email addresses and include poor grammar and formatting – when you think of a phishing scam, you probably picture one of those poorly worded emails […]

Read More >

What Is Application Whitelisting? How It Can Fortify Your Business Against Ransomware

Application Whitelisting has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to protecting your digital assets, well-executed […]

Read More >

Companies are Facilitating their Own Cyber Blackmail, report finds

Ransomware attacks have quadrupled in the past year because companies like yours are paying up! A report released by insurance underwriter Beazley last week found the lure of an easy pay-day, combined with the ease of buying easy-to-operate ransomware kits, had made the attacks a real growth industry for cyber-criminals. “From what we are seeing, […]

Read More >

It’s Time to Embrace the No. 1 ASD Strategy to Mitigate Cyber Intrusion

Since 2013, the Australian Signals Directorate has published a list of 4 critical strategies to adopt if you want to mitigate 85% of the risk from cyberattacks. Do you know what they are? No. 2 on the list is “Patch Applications”. Apply security patches to prevent criminals from entering your network through known flaws that […]

Read More >

Humans make the best attack vector

Who?  Me? If you want to be a hacker, take a persuasive writing course. That’s the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated attacks that take advantage of zero-day flaws in operating systems and productivity software have declined dramatically in favour of attacks that target […]

Read More >