Cyber security has become top of mind for any business looking to adequately protect their IT infrastructure. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And if you haven’t, it […]
For any NFP keen to shore up their cybersecurity, the ACSC Essential 8 provides a valuable and cost-effective framework. The benefits of the framework were highlighted in our recent blog, Mitigation strategies for cyber-attacks: Essential 8 for NFPs. But what are the pillars that make up the framework and how can they help you assess […]
As with all businesses, cyber security has become top of mind for Australian not-for-profits (NFPs) looking to adequately protect their organisation. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And […]
In the past few weeks, Zoom has been receiving a lot of negative attention about security flaws which enable “Zoom Bombing” (this term describes when a cybercriminal enters a random Zoom call to “troll” (share indecent messages, be disruptive, etc.
The global COVID-19 outbreak has changed our community overnight and forced a large portion of the workforce to work from home. We are seeing businesses and employees adjusting: my local HIIT gym are now providing classes online, our favourite restaurant is now doing home deliveries, and we’ve started picking up goods via drive through at […]
There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of […]
Transcript Trent: Thanks for joining us Dave David: Thankyou Trent Trent: Good to see you David: Glad to be here mate Trent: I’ve got a question for you it’s from the news recently and it’s about a data breach in the health industry in Victoria.
Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.
Transcript: Trent: Welcome back, thank-you for joining us today I’m joined by a very special guest David Sia, CEO of Techware. Thanks for joining us Dave.
Got an email from the CEO requesting urgent payment of an invoice (or something similar)? Don’t rush in to get the job done, because you might just be participating in a clever new social engineering hack. In other words, that email might not be from the boss at all.