Preparing for the cyber threats of tomorrow

Passwords are like underpants: Change them often or make them strong Do you know how secure your remote users’ networks are? Hackers are waiting to take advantage of the weakest link. It’s often said, yet not often followed: Passwords are like underpants, they need to be changed often, or have strong ones. For years the...
Learn More

Cyber security governance in public, private sectors falls short

Cyber-crime is the second most-reported economic crime in Australia and costs the economy an estimated $17 billion annually, but despite this there are widespread “frailties” in the governance of cyber security among executives in both the public sector and private enterprise, according to a newly published report. The survey of Australia’s security preparedness by the Macquarie...
Learn More

Security Conversation for CEO’s & the Board Members

Cyber security has become top-of-mind for boards of directors, surpassing concern for business competition and financial risk. The heightened urgency has driven a gap between board members and IT security teams as they navigate threats. These findings come from a new pool of research conducted by Osterman Research. Their goal was to learn more about...
Learn More

The “Cloud”, considerations for security.

Addressing Cloud Computing Security Issues and Challenges Addressing cloud computing security issues and challenges is a complex subject.  It all stems from the fact that when you store your files in the cloud, you are storing them on a computer that is owned by someone else.  We will take a look at the security considerations,...
Learn More

Let’s build a Human Firewall

It is often the illusive “Human Factor” that ends up being the weakest link that makes cyber-attacks and data breaches possible, sometimes even more so than hackers exploiting zero-day system vulnerabilities or employing new malware. Let’s be honest, what is easier to hack, a network based security appliance or a human being? According to the 2016...
Learn More

Fake job Ads

Please be advised to be extremely cautious when applying for jobs following reports of people having their identity ‘stolen’ when responding to fraudulent job ads. Scammers are understood to be posting fake job ads in newspapers and on recruitment websites. These scammers aim to obtain personal details such as bank and passport details so they...
Learn More

Cyber-crime, Social Engineering, and You: Staying on Guard (Even When You’re Not)

With special thanks to Kylie Watson, Sociologist: Digital Innovation Specialist, for this article. It goes without saying that the majority of people reading this article are on guard against identity theft when they’re online. They’re looking for secured connections when inputting information like credit card info, they’re vetting the sites they shop from, they’re abstaining from...
Learn More