Cybersecurity articles

A list of all our IT business support articles under the category of Cybersecurity.

undraw_typewriter_i8xd
Home       Cybersecurity       Page 6

5 Tech Trends Every Melbourne Business Should Know

It’s easy to forget how tech trends have gained traction in homes across Melbourne. Two tech trends that immediately come to mind are smart doorbells and TVs. You might have seen recent footage of Cathy Freeman at the Sydney Olympics in the news. Looking back at that grainy footage you can see how far technology has skyrocketed. Now your TV not only broadcasts incredible 4K pictures streamed on Netflix, but in many cases can use ...

Are Directors Liable for Cybersecurity Neglect?

It's the moment that company boards and their directors have been waiting for. The question of whether directors are liable for cybersecurity neglect looks like it's been answered. During the Financial Review's Cyber Summit in September, Australian Securities and Investment Commission chairman Joe Longo cautioned that company directors could potentially violate their obligations if their firms do not effectively address cyberattacks. This has been hinted at for years, but recent breaches have brought this to ...

Can You Spot A LinkedIn Fake Sales Bot?

LinkedIn has emerged as an invaluable platform for professionals worldwide, enabling users to connect, network, and explore various business opportunities. Since launching in Australia in 2010, LinkedIn has grown in popularity as the preferred way to stay in touch with your business contacts. However, with its increased popularity, LinkedIn is attracting the attention of scammers and fraudsters. Often it's as simple as a connection with someone you know, inviting you to connect via outreach. For ...

Is Your Business’s Cybersecurity Haunted by Hidden Skeletons?

Disney has released its latest movie, Haunted Mansion, in time to entertain the kids during the September school holidays. And if you’re like me growing up in Melbourne, going to see a scary movie wasn’t the only haunted experience you could have. For generations, riding the Ghost Train at Luna Park was terrifying when I was younger. This ride with its ghastly ghouls petrified me…but enjoying a chocolate ice cream on Acland Street afterward was ...

Why Access Management Is Critical For Cybersecurity

It's easy to forget how connected we are both at home and at work. As you leave your car in the station car park and jump on the 7.04 a.m. train to Parliament, you'll likely have already used a handful of cloud-based apps to start your working day - anything from Google Suite to Slack. With the rapid pace of change across digital workplaces, the risk of cyber threats continues to escalate. Poor cybersecurity hygiene ...

Secure Your Business with Cybersecurity Awareness Month

Australians held their breath last month, captivated by the Matildas advancing to the semi-finals at the World Cup. We all watched in awe as their strong defence showed how structured routines are essential for success. Likewise, cybersecurity requires robust defence to protect your digital assets. As you know, defenders block the opponent's advances, intercept passes, and secure the team's territory. In cybersecurity, firewalls, encryption, and intrusion detection systems act as the defensive line, intercepting and ...

Data Privacy Laws: Protect Your Business and Customers

Not a month goes by without the clear and present danger of another cyberattack on an Australian business. In the last few weeks, millions of Australians have had their data stolen by hackers attacking Latitude Financial.  Many Aussies would be surprised to learn that Latitude Financial held sensitive documents dating as far back as 2005 from the previous owner, GE Capital Finance.  Simple, interest-free purchases made at The Good Guys or JB Hi-Fi have now ...
Intuitive IT reduces your risk to your business and your data

What is Essential 8?

What is Essential 8? The inception of the Essential 8 aimed to foster robust security and operational protocols among Australian government bodies, departments, local councils, and other entities operating in the public domain. Many private enterprises consider the Essential Eight an advantageous starting point for evaluating security measures and establishing a fundamental groundwork for cybersecurity. The custodianship of the Essential Eight is under the Australian Cyber Security Centre (ACSC) purview. What are the eight mitigation ...

Embrace Threat Modeling for Cybersecurity

Did you know Australians report a cybercrime every 7 minutes?  The surging increase in cyberattacks appears to dominate each news cycle. If you feel like it never stops, new data from the Australian Cyber Security Centre (ACSC), the Australian Signals Directorate cyber spy agency branch coordinating our response to cybercrime, supports your view. In the most recent reporting period, ACSC received more than 76,000 crime reports. And there only the cybercrimes Aussies chose to report. ...

81% Surge in Business Email Compromise: Expert Insights

Imagine you've stepped out for your morning coffee. After a frantic morning of back-to-back meetings, you're in a hurry, so you duck quickly into the café across the street. But, as you go to tap your smartphone to pay, it pings. Another email from your boss. It's marked urgent. Swiping away the notification, you're curious. He is out of town at a conference. As you idly wait, you decide to open the email. Your boss ...