Mandatory Data Breach Notification

On 3 December 2015 the Australian Government released an exposure draft of its long-awaited mandatory data breach notification bill (the Privacy Amendment (Notification of Serious Data Breaches) Bill  2015  and  https://www.ag.gov.au/Consultations/Pages/serious-data-breach-notification.aspx). If passed, the bill would require private sector organisations and Federal government agencies to notify the Federal Privacy Commissioner and affected individuals of serious data breaches....
Learn More

Behaviour change

At Layer 8 Security, we believe that security awareness training aims not only to impart information, but also to change behaviour and hopefully culture. In order to accomplish this, learners must be as engaged and focused on the lessons as possible. Studies in neuroplasticity (the human ability to “rewire” our brain) show that casual exposure...
Learn More

Scam of the week -20th January 2016

A number of people using Dell PCs have been contacted by scammers claiming to be Dell Tech Support who actually had specific data that only Dell could have had. We’re talking the customer service tag number, a support number printed on a sticker on every Dell computer. This is a variant on the Microsoft tech...
Learn More

ROI of Cyber Security User Awareness Training

These programs provide better protection of organisational assets by: Helping employees recognize and respond appropriately to real and potential security concerns. Providing fresh, updated information to keep your staff current on new risks and what to do about them. Making employees, contractors, and business partners aware that the data on their computers and mobile devices,...
Learn More

Scammers using CEO addresses to rip off companies

Scammers are reportedly claiming to be corporate CEOs in email scams designed to steal up to hundreds of thousands of dollars from targeted companies. Scammers misrepresenting themselves as corporate CEOs are sending fake emails to the CFOs of targeted companies. These emails request that up to hundreds of thousands of dollars be transferred urgently from...
Learn More

Phishing vs SMiShing

What can fit into your pocket, take selfies at an alarming rate, and own your whole corporate network? If you guessed your phone or tablet, you win the door prize. That little social media box that so many are connected to 24/7, has been used for an alarming increase in an attack called SMiShing, or...
Learn More

Social media Tips

Social media sites, such as Facebook, Twitter, Instagram and LinkedIn, are amazing resources, allowing you to meet, interact and share with people around the world However, all this power also brings risk for you, your family, friends and employer. In this newsletter, we explain what these dangers are and how to use these sites securely and safely. Privacy: A common...
Learn More

How human error facilitates cyber attacks

All humans make mistakes. Some bigger than others, but I doubt anyone could argue the statement that “To err is human”. One of the most intriguing findings from IBM’s “Cyber Security Intelligence Index” is that 95 percent of all security incidents involve human error. Many of these are successful security attacks from external attackers who prey on...
Learn More