by Phil Odence | Sep 1, 2022 | Assessment & Audit, Mergers & Acquisitions, Partnerships
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even...
by Thomas LaRock | Aug 25, 2022 | Network Security, Security Operations
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology...
by The Production Team | Aug 25, 2022 | GENERAL
Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch...
by The Production Team | Aug 15, 2022 | Security Operations
Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the...
by The Production Team | Aug 2, 2022 | GENERAL
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much and I wanted to share what I’ve learnt so far. Sleep is everything I...
by The Production Team | Aug 2, 2022 | GENERAL
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much and I wanted to share what I’ve learnt so far. Sleep is everything I...
by The Production Team | Aug 1, 2022 | SMB
Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer...
by The Production Team | Jul 25, 2022 | Data Management
Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge...
by The Production Team | Jul 14, 2022 | Security Operations
If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has...
by The Production Team | Jun 27, 2022 | BUSINESS
The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from...
by The Production Team | Jun 27, 2022 | Reports & Predictions
The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from...
by The Production Team | Jun 22, 2022 | GENERAL
I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer. The following is a...
by Scott Fletcher | Jun 21, 2022 | Cloud Security
I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are continually...
by The Production Team | Jun 2, 2022 | Reports & Predictions
According to recent research, published by Tenable’s Staff Research Engineer, Satnam Narang, scammers have once again dug deep into their bag of tricks to capitalise on the fervour in non-fungible tokens (NFT) and cryptocurrencies. Many are hijacking verified and...
by Jo Stewart-Rattray | May 24, 2022 | Data Management, Governance & Risk
It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and workers driven online, businesses adapted and accelerated their digital...
by The Production Team | May 23, 2022 | Security Awareness
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention – and often goes unmentioned – is how we communicate internally to our teams on the...
by The Production Team | May 23, 2022 | Security Awareness
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention – and often goes unmentioned – is how we communicate internally to our teams on the...
by The Production Team | Dec 18, 2021 | Data Management, Geo-Political & Military
*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it’d obtained and used data on over 50 million Facebook consumers with the goal to promote the presidential...
by The Production Team | Dec 11, 2021 | Data Management, Security Awareness
Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we’ve all been through to one degree or tuther in 2020. We wanted to ensure that retailers are improving their security posture...
by The Production Team | Nov 20, 2021 | Artificial Intelligence, Security Operations
AI for Retail I have been attending a few events within the retail sector and a lot of touched on artificial intelligence. Knowing Jo and his background, I wanted him to share his thoughts and luckily enough it was an area he was heavily involved in already. Have a...
by The Production Team | Nov 8, 2021 | Identity & Access Management, Security Awareness
The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing. According to the report,...
by The Production Team | Nov 6, 2021 | Data Management, Endpoint Protection
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may...
by The Production Team | Nov 2, 2021 | Security Awareness, Security Operations, Social Engineering
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it. I wanted to dig a little deeper and get some cold hard facts on...
by The Production Team | Oct 25, 2021 | Data Management, Governance & Risk
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations...
by The Production Team | Oct 8, 2021 | Work & Careers
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech...
by The Production Team | Oct 3, 2021 | Security Awareness, Security Operations
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise...
by The Production Team | Sep 26, 2021 | Cloud Security, Governance & Risk
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as...
by The Production Team | Sep 18, 2021 | Governance & Risk, Network Security
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain...
by The Production Team | Aug 27, 2021 | Compliance & Legal, Data Management, Security Operations
ARNECC, ELN, ELNO, ECNL, PEXA… A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A...
by The Production Team | Aug 23, 2021 | Network Security, Security Operations
Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal....
by The Production Team | Aug 2, 2021 | Compliance & Legal, Governance & Risk, Security Operations
Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted...
by The Production Team | Aug 1, 2021 | Risk Management, Security Operations
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will...
by The Production Team | Jul 31, 2021 | Compliance & Legal, Security Operations
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment...
by The Production Team | Jul 6, 2021 | Data Management, Social Engineering
Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when...
by The Production Team | Jul 6, 2021 | Governance & Risk, Security Operations
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more...
by The Production Team | Jul 6, 2021 | Digital Forensics, Security Awareness
This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim’s...
by The Production Team | Jul 5, 2021 | Risk Management, Security Awareness
A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions...
by The Production Team | Jul 4, 2021 | Governance & Risk, Security Awareness
The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk...
by Gabor Szathmari | Jul 3, 2021 | Assessment & Audit, Compliance & Legal
You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being...
by The Production Team | Jun 26, 2021 | Compliance & Legal, Data Management
You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article,...
by The Production Team | Jun 13, 2021 | Endpoint Protection, Network Security, Security Operations
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows...
by The Production Team | Jun 13, 2021 | Security Awareness, Social Engineering
Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion’s new study can now reveal. Iron Bastion have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The...
by The Production Team | May 21, 2021 | Application Security, Security Operations
There’s been a lot of publicity in the market about Zoom. A lot of companies are jumping on this as their platform of choice as a fundamental tool for connecting with their staff and customers; totally understandable considering where things are at in the world at the...
by The Production Team | May 21, 2021 | Assessment & Audit, Compliance & Legal, Governance & Risk
An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and...
by The Production Team | Apr 6, 2021 | Artificial Intelligence
We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it’s about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the...
by The Production Team | Mar 8, 2021 | Learning & Education, Work & Careers
Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention – and often goes...
by The Production Team | Jan 29, 2021 | GENERAL
You had a neat idea. You’ve built on it, and now started to turn it into a commercial reality. It doesn’t matter if you’ve the best product or service in the universe, if it’s not developed, marketed, sold, and delivered in the best possible way you’re falling short...
by The Production Team | Jan 3, 2021 | Security Awareness, Security Operations
Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions which should help you get started with your first phishing...