Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes.
How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Cyber warfare: how to counter the rising threat
While preventing ransomware attacks and data theft tend to be top priorities for corporate IT security teams, awareness is increasing of the growing threats posed by cyber warfare.
Why 2023 is the Year to Implement a Zero-Trust Strategy
Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.
Are ransomware attacks becoming a cost of doing business in Australia?
It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.
A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.
How to Protect Your Legal Practice from Payment Redirection Fraud
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing...
Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business
A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking...
Podcast Episodes

Episode 212 Deep Dive: Nathan Wenzler | Cybersecurity’s Prominent Place in the ESG Conversation: Protecting the Planet and Society
