Intuitive Cybersecurity articles

undraw_typewriter_i8xd
Home       Intuitive Cybersecurity

Ransomware Alert: Fake Windows Update Threat

With celebrations of the Pies' victory behind us, no sooner is it horse racing season and attention turns to Flemington. The change from footy to the races brings longer and warmer days, so taking your laptop outdoors for a few moments makes sense. You can enjoy fresh air while checking emails and drinking a short black. It’s easy to get lost in your thoughts in the sunshine. So, when your laptop prompts you to install ...

“Secure By Design” Cybersecurity Practices: Why It Matters

Did you know that last week, cybercriminals hacked a small family-owned builder?[1] Or a small car dealership was attacked due to poor passwords?[2] It's easy to think that cyber threats only exist for large companies like Subway or Dymocks. However, cybersecurity is a critical foundation on which businesses, no matter their size, must rely. The implications of cyberattacks can have far-reaching and long-term consequences that may include significant financial losses, reputational damage, and the compromise ...

Top 10 Cybersecurity Mistakes To Avoid

Running a small business in the suburbs of Melbourne may seem a mile away from the corporate buildings that dominate our CBD skyline. You frequently work long hours, often driving in heavy traffic through endless 'big builds' and worrying about cash flow. It's understandable to think you are not a target for cyber crooks looking for their next victim. The media is full of stories of large companies like Medibank and Optus being attacked, not ...

Are Directors Liable for Cybersecurity Neglect?

It's the moment that company boards and their directors have been waiting for. The question of whether directors are liable for cybersecurity neglect looks like it's been answered. During the Financial Review's Cyber Summit in September, Australian Securities and Investment Commission chairman Joe Longo cautioned that company directors could potentially violate their obligations if their firms do not effectively address cyberattacks. This has been hinted at for years, but recent breaches have brought this to ...

Can You Spot A LinkedIn Fake Sales Bot?

LinkedIn has emerged as an invaluable platform for professionals worldwide, enabling users to connect, network, and explore various business opportunities. Since launching in Australia in 2010, LinkedIn has grown in popularity as the preferred way to stay in touch with your business contacts. However, with its increased popularity, LinkedIn is attracting the attention of scammers and fraudsters. Often it's as simple as a connection with someone you know, inviting you to connect via outreach. For ...

Is Your Business’s Cybersecurity Haunted by Hidden Skeletons?

Disney has released its latest movie, Haunted Mansion, in time to entertain the kids during the September school holidays. And if you’re like me growing up in Melbourne, going to see a scary movie wasn’t the only haunted experience you could have. For generations, riding the Ghost Train at Luna Park was terrifying when I was younger. This ride with its ghastly ghouls petrified me…but enjoying a chocolate ice cream on Acland Street afterward was ...

Why Access Management Is Critical For Cybersecurity

It's easy to forget how connected we are both at home and at work. As you leave your car in the station car park and jump on the 7.04 a.m. train to Parliament, you'll likely have already used a handful of cloud-based apps to start your working day - anything from Google Suite to Slack. With the rapid pace of change across digital workplaces, the risk of cyber threats continues to escalate. Poor cybersecurity hygiene ...

Secure Your Business with Cybersecurity Awareness Month

Australians held their breath last month, captivated by the Matildas advancing to the semi-finals at the World Cup. We all watched in awe as their strong defence showed how structured routines are essential for success. Likewise, cybersecurity requires robust defence to protect your digital assets. As you know, defenders block the opponent's advances, intercept passes, and secure the team's territory. In cybersecurity, firewalls, encryption, and intrusion detection systems act as the defensive line, intercepting and ...
Intuitive IT reduces your risk to your business and your data

What is Essential 8?

What is Essential 8? The inception of the Essential 8 aimed to foster robust security and operational protocols among Australian government bodies, departments, local councils, and other entities operating in the public domain. Many private enterprises consider the Essential Eight an advantageous starting point for evaluating security measures and establishing a fundamental groundwork for cybersecurity. The custodianship of the Essential Eight is under the Australian Cyber Security Centre (ACSC) purview. What are the eight mitigation ...

Embrace Threat Modeling for Cybersecurity

Did you know Australians report a cybercrime every 7 minutes?  The surging increase in cyberattacks appears to dominate each news cycle. If you feel like it never stops, new data from the Australian Cyber Security Centre (ACSC), the Australian Signals Directorate cyber spy agency branch coordinating our response to cybercrime, supports your view. In the most recent reporting period, ACSC received more than 76,000 crime reports. And there only the cybercrimes Aussies chose to report. ...