Intuitive Cybersecurity articles

undraw_typewriter_i8xd
Home       Intuitive Cybersecurity       Page 5

Are Directors Liable for Cybersecurity Neglect?

It's the moment that company boards and their directors have been waiting for. The question of whether directors are liable for cybersecurity neglect looks like it's been answered. During the Financial Review's Cyber Summit in September, Australian Securities and Investment Commission chairman Joe Longo cautioned that company directors could potentially violate their obligations if their firms do not effectively address cyberattacks. This has been hinted at for years, but recent breaches have brought this to ...

Can You Spot A LinkedIn Fake Sales Bot?

LinkedIn has emerged as an invaluable platform for professionals worldwide, enabling users to connect, network, and explore various business opportunities. Since launching in Australia in 2010, LinkedIn has grown in popularity as the preferred way to stay in touch with your business contacts. However, with its increased popularity, LinkedIn is attracting the attention of scammers and fraudsters. Often it's as simple as a connection with someone you know, inviting you to connect via outreach. For ...

Is Your Business’s Cybersecurity Haunted by Hidden Skeletons?

Disney has released its latest movie, Haunted Mansion, in time to entertain the kids during the September school holidays. And if you’re like me growing up in Melbourne, going to see a scary movie wasn’t the only haunted experience you could have. For generations, riding the Ghost Train at Luna Park was terrifying when I was younger. This ride with its ghastly ghouls petrified me…but enjoying a chocolate ice cream on Acland Street afterward was ...

Why Access Management Is Critical For Cybersecurity

It's easy to forget how connected we are both at home and at work. As you leave your car in the station car park and jump on the 7.04 a.m. train to Parliament, you'll likely have already used a handful of cloud-based apps to start your working day - anything from Google Suite to Slack. With the rapid pace of change across digital workplaces, the risk of cyber threats continues to escalate. Poor cybersecurity hygiene ...

Secure Your Business with Cybersecurity Awareness Month

Australians held their breath last month, captivated by the Matildas advancing to the semi-finals at the World Cup. We all watched in awe as their strong defence showed how structured routines are essential for success. Likewise, cybersecurity requires robust defence to protect your digital assets. As you know, defenders block the opponent's advances, intercept passes, and secure the team's territory. In cybersecurity, firewalls, encryption, and intrusion detection systems act as the defensive line, intercepting and ...
Intuitive IT reduces your risk to your business and your data

What is Essential 8?

What is Essential 8? The inception of the Essential 8 aimed to foster robust security and operational protocols among Australian government bodies, departments, local councils, and other entities operating in the public domain. Many private enterprises consider the Essential Eight an advantageous starting point for evaluating security measures and establishing a fundamental groundwork for cybersecurity. The custodianship of the Essential Eight is under the Australian Cyber Security Centre (ACSC) purview. What are the eight mitigation ...

Embrace Threat Modeling for Cybersecurity

Did you know Australians report a cybercrime every 7 minutes?  The surging increase in cyberattacks appears to dominate each news cycle. If you feel like it never stops, new data from the Australian Cyber Security Centre (ACSC), the Australian Signals Directorate cyber spy agency branch coordinating our response to cybercrime, supports your view. In the most recent reporting period, ACSC received more than 76,000 crime reports. And there only the cybercrimes Aussies chose to report. ...

81% Surge in Business Email Compromise: Expert Insights

Imagine you've stepped out for your morning coffee. After a frantic morning of back-to-back meetings, you're in a hurry, so you duck quickly into the café across the street. But, as you go to tap your smartphone to pay, it pings. Another email from your boss. It's marked urgent. Swiping away the notification, you're curious. He is out of town at a conference. As you idly wait, you decide to open the email. Your boss ...

Survive the Unexpected: Small Business Guide

Living in a cosmopolitan city like Melbourne, getting complacent is easy. We have had a challenging few years during the pandemic but living in Melbourne, or Australia more broadly, we are a lucky country. That's not to say we don't have our issues and are not immune from threats ranging from natural disasters to cyberattacks.  As you know, Melbourne has experienced two earthquakes in the last few weeks. Fortunately, they have not caused widespread damage ...

3 Proven Ways to Avoid Data Breach Costs

You've undoubtedly found yourself in a fire drill when working in a tall office building in Docklands or along Lonsdale Street. You understand how it feels when you hear the first beep, beep, followed by the whoop, whoop. So you know, by working on the 19th floor... it will be a long way down the emergency stairs to the marshalling point.  But here's the thing, practising an evacuation saves lives, and all employees should participate, ...