Introduction All organisations today rely heavily on the internet, information systems, communications systems and collaboration in business, investing significantly in these resources to compete in today’s global marketplace. This investment in these, however, exposes organisations to risks and threats that can result in major losses such as financial, intellectual property, customers and reputation. To protect … Continue reading Security Knowledge, Attitude, Behaviour Program Overview
All organisations rely heavily on the internet, investing significant resources as a means to compete in today’s global marketplace. This investment in the internet, however, exposes organisations to risks and threats that result in major losses such as financial, intellectual property and reputation. To protect from these adverse risks and threats, organisations often resort to … Continue reading Security awareness is a joke
The WannaCry’s encryption scheme works by generating a pair of keys on the victim’s computer that rely on prime numbers, a “public” key and a “private” key for encrypting and decrypting the system’s files respectively. To prevent the victim from accessing the private key and decrypting locked files himself, WannaCry erases the key from the system, leaving … Continue reading WannaCry Ransomware Decryption Keys
The WannaCry ransomware is built with a shoddy payment process that might result in no response, according to security researchers. Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom? Those who do shouldn’t expect a quick response — or any response at all. … Continue reading Paying the WannaCry ransom will probably get you nothing. Here’s why.
It’s a curious reality that, although employees are swiftly punished for violating information security policy, such an extreme lack of interest in providing those employees with adequate cybersecurity awareness training exists amongst organizations. In a survey conducted by Enterprise Management Associates (EMA), only 56 percent of employees said that they receive cybersecurity awareness and policy … Continue reading How to Encourage Employees to Promote Cybersecurity Awareness
On 13 February 2017 the Australian Government passed the Privacy Amendment (Notifiable Data Breaches) Bill 2017
Who does this affect? The new requirements affect all APP entities i.e. any entity that is currently bound to comply with the Australian Privacy Principles under the Privacy Act 1988 (Cth), including Commonwealth Government Agencies and private organisations with an annual turnover of more than AUD3 million, as well as a limited number of other … Continue reading On 13 February 2017 the Australian Government passed the Privacy Amendment (Notifiable Data Breaches) Bill 2017
Organisations will soon be legally obliged to disclose data breaches thanks to a new bill that has been passed by the Federal Government. How will these new laws impact your business? Read on to find out more. After going through the House of Representatives last week, The Privacy Amendment (Notifiable Data Breaches) Bill 2016 made … Continue reading How Will Australia’s New Mandatory Data Breach Notification Laws Impact Your Business?
Perhaps hundreds of emails cross your screen every day. The day can drag on and in the monotony of your daily routine, you just keep clicking on links without a care in the world. OK, maybe things aren’t that bad, but those phishing scams are tricky and it takes ever-vigilant users and security departments to … Continue reading Phishing test results in a barely-passing grade for users
January 18, 2017 | Security and Risk | Amy Burnis Securing privileged accounts and credentials must be at the top of the enterprise security agenda, and we’ve previously highlighted five top reasons why on CyberArk’s blog. With the launch of a new year, it’s a good time to be mindful of the lessons learned in … Continue reading Noteworthy Cyber Security Statistics
In 2016, hundreds of thousands of IoT devices were hacked due to the use of insecure default passwords. DDoS source codes like Mirai scan the internet, searching for these poorly-protected devices, upon which they flood them with various forms of attack, resulting in anything from stolen information to device manipulation and sabotage of operations. Earlier … Continue reading Most common passwords revealed