Blog

47 Results / Page 2 of 5

Background

Downloads admin_cyber / August 3, 2021

Case Study – Subcontractor Scam

Criminals swindle a construction firm out of large payment by impersonating a subcontractor.. Compared to many other industries, construction companies have been slower to take up cyber insurance. Because they typically don’t hold large amounts of sensitive data and aren’t solely reliant on their computer systems to carry out their [...]

Downloads admin_cyber / August 2, 2021

Case Study – Legacy system letdown

Businesses involved in contracting work, such as plumbers, builders and electricians, have generally been slower to purchase cyber insurance policies. Because they typically don’t hold large amounts of sensitive data and they don’t usually rely on their computer systems to carry out their day-to-day work, businesses of this nature often [...]

Downloads admin / July 19, 2021

Phishing for funds

A business email compromise scam tricks law firm into transferring money to fraudsters   Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing over confidential information, or clicking on a malicious link, and it’s causing serious financial harm [...]

Downloads admin / July 19, 2021

The top 6 cyber insurance myths debunked

Cyber is one of the hottest topics in insurance and, as a line of business, it’s projected to experience phenomenal growth in the years ahead. But cyber is still a relatively new market and can be made unnecessarily complex by industry jargon, buzzwords of the day, and a lack of [...]

Downloads admin / July 19, 2021

5 reasons hackers target SMEs

While the massive influx of remote working has woken many businesses up totheir cyber risk, it is also creating more opportunity for cybercriminals looking to exploit it. Cyber claims rates are on the rise and the majority of victims are small and mediumsized businesses being hit with cybercrimes like funds [...]

todayApril 24, 2019

  • 287
  • 198
close

Ransomware admin

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 236
  • 195
close

Cyber security + Global news admin

Prioritization to Prediction: Getting Real About Remediation.

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 99
  • 171
close

Cybercrime admin

Mid-Market Businesses, Don’t Think Small about Security

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...

todayApril 24, 2019

  • 98
  • 141
close

Cyber security + Global news admin

DHS issues emergency Directive to prevent DNS hijacking attacks

Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...




Products


Company


Contacts

Support

Follow us
“This project is funded by the Australian Government Department of Industry, Science, Energy and Resources through the Cyber Security Business Connect and Protect Program.”