Blog

42 Results / Page 1 of 5

Background

Downloads admin_cyber / October 14, 2021

Database Debacle

A ransomware attack throws up unforeseen complications for a domestic goods retailer Over the past two decades, technology has transformed the way businesses operate, and most depend on their computer systems in one way or another. Even traditional businesses, such as retail stores and wholesale distributors, utilize computer systems and [...]

Downloads admin_cyber / August 16, 2021

Quick Fix Complication

Cyber insurance is projected to experience major growth in the years ahead and new carriers are regularly entering the market. This is creating greater competition and providing more choice for customers. Businesses should be aware, however, that not all insurers are alike, and the skills and expertise that a well- [...]

Downloads admin_cyber / August 15, 2021

Case Study – Website Workout

An appliance retailer suffers a significant sales shortfall after its website is taken down by hackers The dawn of the internet has opened up a world of opportunity for businesses, allowing them to reach new markets and increase their revenues. Along with this, however, has come new risks. With many [...]

Downloads admin_cyber / August 12, 2021

Case Study – Legacy system letdown

A ransomware attack on an electrical firm sparks the collapse of a vital accounting system Businesses involved in contracting work, such as plumbers, builders and electricians, have generally been slower to purchase cyber insurance policies. Because they typically don’t hold large amounts of sensitive data and they don’t usually rely [...]

Downloads admin_cyber / August 10, 2021

CEO Swindle

A manufacturing firm transfers thousands to scam artists after falling victim to CEO fraud. Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing over confidential information, or clicking on a malicious link, and it’s causing serious financial harm [...]

Downloads admin_cyber / August 3, 2021

Case Study – Subcontractor Scam

Criminals swindle a construction firm out of large payment by impersonating a subcontractor.. Compared to many other industries, construction companies have been slower to take up cyber insurance. Because they typically don’t hold large amounts of sensitive data and aren’t solely reliant on their computer systems to carry out their [...]

Downloads admin_cyber / August 2, 2021

Case Study – Legacy system letdown

Businesses involved in contracting work, such as plumbers, builders and electricians, have generally been slower to purchase cyber insurance policies. Because they typically don’t hold large amounts of sensitive data and they don’t usually rely on their computer systems to carry out their day-to-day work, businesses of this nature often [...]

Downloads admin / July 19, 2021

Phishing for funds

A business email compromise scam tricks law firm into transferring money to fraudsters   Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing over confidential information, or clicking on a malicious link, and it’s causing serious financial harm [...]

Downloads admin / July 19, 2021

The top 6 cyber insurance myths debunked

Cyber is one of the hottest topics in insurance and, as a line of business, it’s projected to experience phenomenal growth in the years ahead. But cyber is still a relatively new market and can be made unnecessarily complex by industry jargon, buzzwords of the day, and a lack of [...]

Downloads admin / July 19, 2021

5 reasons hackers target SMEs

While the massive influx of remote working has woken many businesses up totheir cyber risk, it is also creating more opportunity for cybercriminals looking to exploit it. Cyber claims rates are on the rise and the majority of victims are small and mediumsized businesses being hit with cybercrimes like funds [...]



Products


Company


Contacts

Support

Follow us
“This project is funded by the Australian Government Department of Industry, Science, Energy and Resources through the Cyber Security Business Connect and Protect Program.”