Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren’t sure what that exploited means in context, imagine a hacker standing behind you 24×7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data.
Why You Should Care About the Optus Breach If You’re A Customer
By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward remedy....
Communication for Internal Teams On the Importance of Understanding Risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more...
ISACA ANZ | Cyber-safe Christmas
Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to...
Phishing Is the Top Reason Behind Australian Data Breaches
The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the...
TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags...
A Scam Which Preys on Vulnerable People (and Works!)
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion...