Blog

47 Results / Page 1 of 5

Background

todayJanuary 13, 2022

  • 189
close

Extras admin_cyber

Hit by ransomware? Make sure you don’t make this first obvious mistake

Organisations that fall victim to a ransomware attack shouldn’t let the cyber criminals know they have cyber insurance – because if the attackers know that their victim holds an insurance policy, they’re more likely to outright demand the ransom payment in full. Cybersecurity researchers at Fox-IT, part of NCC Group, examined ...

todayJanuary 12, 2022

  • 96
close

Extras admin_cyber

Log4j: What Boards and Directors Need to Know

Log4j is a software library used as a building block found in a wide variety of Java applications. It provides logging functionality in many products ranging from messaging and productivity applications, mobile device managers, teleconference software, web hosting and even video games. Over 100,000 products from hundreds of vendors – and in house ...

todayJanuary 6, 2022

  • 138
close

Extras admin_cyber

Copycat and fad hackers will be the bane of supply chain security in 2022

Replicable attacks and a low barrier to entry will ensure the rate of supply chain attacks increases next year, cybersecurity researchers have warned.  The supply chain is a consistent attack vector for threat actors today. By compromising a centralized service, platform, or software, attackers can then either conduct widespread infiltration of the ...

todayDecember 28, 2021

  • 180
close

Extras admin_cyber

How to Protect Your Business Against Phishing

Phishing attacks are one of the most common security challenges that both individuals and businesses face when it comes to protecting their information. Hackers are using email, social media, phone calls, and any other form of communication they can to steal valuable data, whether it’s passwords, credit cards, or other ...

todayDecember 13, 2021

  • 205
close

Extras admin_cyber

5 Tips to Keep Your Holiday Season Cyber-Safe

It’s that time of year again: holiday shopping has begun! E-commerce sales are rapidly increasing as a result of many consumers avoiding stores and purchasing more online, with no sign of consumers returning to their old habits anytime soon. Fortunately, online shopping is becoming more intuitive and simple by the ...

Downloads admin_cyber / October 14, 2021

Database Debacle

A ransomware attack throws up unforeseen complications for a domestic goods retailer Over the past two decades, technology has transformed the way businesses operate, and most depend on their computer systems in one way or another. Even traditional businesses, such as retail stores and wholesale distributors, utilize computer systems and [...]

Downloads admin_cyber / August 16, 2021

Quick Fix Complication

Cyber insurance is projected to experience major growth in the years ahead and new carriers are regularly entering the market. This is creating greater competition and providing more choice for customers. Businesses should be aware, however, that not all insurers are alike, and the skills and expertise that a well- [...]

Downloads admin_cyber / August 15, 2021

Case Study – Website Workout

An appliance retailer suffers a significant sales shortfall after its website is taken down by hackers The dawn of the internet has opened up a world of opportunity for businesses, allowing them to reach new markets and increase their revenues. Along with this, however, has come new risks. With many [...]

Downloads admin_cyber / August 12, 2021

Case Study – Legacy system letdown

A ransomware attack on an electrical firm sparks the collapse of a vital accounting system Businesses involved in contracting work, such as plumbers, builders and electricians, have generally been slower to purchase cyber insurance policies. Because they typically don’t hold large amounts of sensitive data and they don’t usually rely [...]

Downloads admin_cyber / August 10, 2021

CEO Swindle

A manufacturing firm transfers thousands to scam artists after falling victim to CEO fraud. Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing over confidential information, or clicking on a malicious link, and it’s causing serious financial harm [...]



Products


Company


Contacts

Support

Follow us
“This project is funded by the Australian Government Department of Industry, Science, Energy and Resources through the Cyber Security Business Connect and Protect Program.”