Organised criminals are using new tactics to put a new face on old crimes, and with overwhelming success. Better analysis of network data is emerging as a powerful defence helping Australian companies to harness the power of analytics to detect breaches early and minimize their exposure.
For most companies it is a race against time to patch critical vulnerabilities and avoid a data breach. Based on the findings of Today’s State of Vulnerability Response: Patch Work Demands Attention, sponsored by ServiceNow, the inability to patch in a timely manner is due to broken patch management processes. Specifically, many companies are relying upon manual processes and have difficulty in prioritising the vulnerabilities that need patching. Ponemon Institute surveyed almost 3,000 IT security professionals in Australia/New Zealand, France, Germany, Japan, Netherlands, Singapore, United Kingdom and the United States to understand how organisations are responding to vulnerabilities and preventing hackers from exploiting attack vectors. In this report, we present the Australia and New Zealand findings. Download whitepaper »
This eBook discusses the Australian Signals Directorate’s (ASD) Essential Eight strategies to mitigate cybersecurity incidents along with the who, what, where and why of successful implementation. Download whitepaper »
How Proofpoint helps protect your organisation from impostors, phishers and other non-malware threats. Download whitepaper »
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.