It’s a good time to be a hacker. Maybe.
It’s a good time to be a hacker. Maybe.
'A fool pulls the leaves. A brute chops the trunk. A sage digs the roots' - Author Pierce Brown
During a DDoS attack, time can be your biggest enemy. Lost seconds can have a huge impact on whether you are successful in mitigating an attack in time, or failure could mean costly network downtime. Anything that accelerates your Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) to an attack provides you with a clear advantage.
Historically, there’s little love lost between NetOps (network operations) personnel and those in SecOps (security operations).
As technology continues to advance, so does the threat of cybersecurity attacks. This will require a drastic shift in perception for Australian businesses: to prioritise prevention, rather than reaction, in order to combat the various complexities of cyber-attacks.
Last year saw a new wave of high-profile data breaches that reminded us that no industry is safe.
Today’s factories – be they relatively simple production facilities, or highly complex automation environments – face a dilemma that was unimaginable in earlier times.
In the year ahead, businesses of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected and high impact security events.
Australian businesses have been tested massively this year in terms of cyber security, with an increasing number of high profile businesses in the spotlight for all the wrong reasons.
Today’s schools are technology-rich environments. They have long used internal systems to store personal data records of students and faculty but, today, that technology infrastructure must be optimised to accommodate the shift to a new digital education model.
While traditional archives systems no longer consist of numerous dusty boxes of paper records (hopefully), most have fallen woefully out of date.
Whenever you browse the internet, chances of any cyberattack or theft are likely. When a virus attacks you through your browser, your information, such as your passwords or your information could get stolen.
For many years, IT departments and their infrastructures were managed under a strict command-and-control structure. This situation is now rapidly changing, and CIOs need to change with it.
Cybersecurity – and consequently cyber insurance – is something that not many SMEs (small to medium-sized enterprises) spend time thinking about.
One of the major aspects of ITAM (IT Asset Management) is SAM (Software Asset Management). SAM has seen a huge increase in interest and demand in its services recently.
With business becoming increasingly digital, the deployment of solid IT security has never been more important. Breaches can cause anything from mild inconvenience to widespread disruption and financial lo
The frequency of financial crime and the diversity of attack techniques are increasing, forcing enterprises into difficult investment decisions to contain risks and comply with regulations.
Is Australia becoming its own worst enemy when it comes to addressing cybersecurity?
Australian companies more prone to long business interruptions due to ransomware
Companies spend a lot of time and energy ensuring their IT systems are secured against external cyber attacks. Unfortunately, many don’t realise they also need to consider threats that originate from within.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.