Safeguarding Sensitive Data: The Power of Clean Desk Policies
Clean desk policies may appear excessive, but our work desks are extensions of ourselves and we like to add some personal touches to them! The
Clean desk policies may appear excessive, but our work desks are extensions of ourselves and we like to add some personal touches to them! The
Baiting is a cyber attack strategy. It involves offering a false promise or a trap of some kind. The result that attackers seek is to
As we celebrate Privacy Awareness Week (1-7 May), it’s important to recognise that our personal information is more vulnerable than ever before. Now is the
In our latest blog post we take a look at the Australian Institute of Company Directors and the Cybersecurity Cooperative Research Centre’s Cybersecurity Governance Principle 4 :
We’re continuing our series of blog posts about the Australian Institute of Company Directors and the Cyber Security Cooperative Research Centre’s Cybersecurity Governance Principles. These
Running a business without a cyber incident strategy is like riding a bike without a helmet. Sure you can probably go pretty far with no
2022 was a year to remember in the cybersecurity world! Every year, we see more and more cybersecurity incidents around the world. It might even
The Australian Institute of Company Directors and the Cyber Security Cooperative Research Centre recently put out a joint paper. It provides some guidelines around cyber
Have you ever wondered what a full-scale cyberattack response looks like from the inside? We often see the aftermath of an attack from the outside.
A scam message – or “phishing” message – is an email or other communication sent with the intent of deceiving the recipient. These messages can
With some major data breaches hitting the news recently, you might be wondering: how do hackers even find the vulnerabilities that they exploit? The movies
If your organisation is PCI compliant, it meets the requirements of the Payment Card Industry Data Security Standard – commonly referred to as PCI-DSS. This
The average time taken to detect a breach in 2021 was 212 days, so it’s no surprise that a recent study by IBM revealed that
Business Email Compromise (BEC) is a type of spear phishing attack that can significantly damage the goodwill and credibility of your organisation. Before it wreaks
The Australian Cyber Security Centre (ACSC) has released the “Have you been hacked” tool that is designed to step potential victims through a series
October is Cybersecurity Awareness Month Most of us would have seen the news headlines about the most significant cyber attack in Australian history, with the
Since Australia’s 2013 National Plan to Combat Cybercrime was published, the cybersecurity landscape has changed drastically. As technology becomes more integrated with professional and personal
The Growing Dark Web Marketplaces The dark web market has been growing at an alarming rate due to increased demand for illicit goods and services
Our inboxes are a common target for cybercriminals. Between an influx of sensitive information coupled with a plethora of promotional emails, it becomes easier for
Cybersecurity has become crucial for every business and government agency. The need to secure our information and systems is paramount to avoiding the financial and
A Rise in Cybercrime Cybercrime is on the rise and it is costing businesses and governments billions of dollars. In Australia, we’ve witnessed a staggering
Recently we touched upon the general nature of smishing attacks, but it is imperative that we elaborate on their prevalence and impact. It’s critical for
What is Ransomware? Ransomware is a form of malware that encrypts files on a computer or device, making them inaccessible to the user. Once immobilised,
With the rapid rise of data breaches in the public and private sectors in Australia and around the world, we can anticipate a dramatic rise
Business owners have a long list of responsibilities. They wear many hats; from running the business, iterating on MVP or product, to filing for IPO
Australia’s tertiary sector is no stranger to big cyber attacks, with a recent incident marking the third major university breach in the last three years.
About PhishNet PhishNet delivers highly effective, engaging and affordable cybersecurity training that empowers staff to reduce an organisation’s risk. Talk to PhishNet today to learn
Human error is often the weakest link in an organisation’s cyber security defences. While technological solutions can go a long way towards protecting data and
Smishing is an imminent threat infiltrating the lives of Australians everywhere and it’s coming in the form of the message bubble. It seems like common
In the previous blog article, I discussed the seven-step “Attack Kill Chain,” a methodical series of phases that encompass most cyber attacks. In the “Attack
There is a common misconception that hackers are disorganised criminals who try a chaotic mix of tactics to achieve their intended purpose. However, this couldn’t
With the geo-political instability and economic uncertainty present in today’s world we are seeing more phishing attempts across the globe and pretexting tactics are becoming
Don’t let your company be the next target: find out how hackers are using trusted brands to hide their attempts to keep everybody alert and
Cybersecurity has become a critical competitive differentiator for businesses, and as such, its degree of adoption needs to be tracked. But internal security control audits
Phishing attacks continue to rise as organisations struggle to adapt to the new routines and security requirements of a remote workforce. According to the ACSC
Cybersecurity policies have a very important purpose – to encourage safe practices and avoid errors leading to security incidents. But even with the most thoughtfully
Cybersecurity Top of Mind Data breaches caused by cyberattacks can cause inconvenient disruptions at the least and devastating consequences at worst. With 92% of Australian
A cybersecurity awareness training program is specialised training to educate employees about security threats, safety measures, and best practices. Research indicates that human error is
Hopefully, you’re taking a well-earned break and not reading this on Easter Monday. But just in case you are, happy Easter! Life would be so
Cyberattacks continue to be one of the greatest areas of concern for most businesses. These events don’t just carry the risk of irrevocable reputational damage
According to an IBM study, 95% of data breaches are caused by human error. Even in Australia, human error is an increasing cause of data
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |