On average each month, the Australian Cyber Security Centre (ACSC) receives about 4,400 cybercrime reports through Report Cyber and responds to 168 cyber security incidents.  In this webinar we aim to get you started on your cyber security journey with pragmatic advice explained in plain language – we promise ...

BUSINESS EMAIL COMPROMISE If someone gains unauthorised access to, or impersonates your email account, they can intercept or gain access to your private communications, or send emails pretending to be you. With access to your email account, a cybercriminal can commit fraud, or blackmail you by stealing your financial or ...

BUSINESS EMAIL COMPROMISE If someone gains unauthorised access to, or impersonates your email account, they can intercept or gain access to your private communications, or send emails pretending to be you. With access to your email account, a cybercriminal can commit fraud, or blackmail you by stealing your financial or ...

This module gives trainees a live demonstration of many of the most common cyber-attacks, allowing the trainees to understand how these attacks might be used against their organisation and what the damages might be. Topics include: Ransomware Identity Theft Account Escalation Data Exfiltration Website defacement Man-in-the-Middle attacks PRESENTER: JASON MURRELL ...

For the healthcare sector, 2020 was a frenetic year with an onslaught of ransomware attacks, hacking attacks and data breaches. According to the latest Notifiable Data Breaches (NDB) Scheme report from the OAIC, the health sector remains the highest reporting industry sector, notifying 23% of all breaches. Several factors drive ...