fbpx
Security
  • April 27 2017 How to counter the growing threat of ransomware attacks in your business

    Ever since computers became vital business tools, organisations have faced a constant battle when it comes to IT security. Viruses, worms and other malware types have caused increasing disruption and losses as their sophistication and capabilities have risen. Fast forward to 2017, and one of the most feared types of cyber attack is ransomware.  Designed Read More…

  • April 5 2017 Resolving customer data management issues enables SMEs to evolve their business model

    Accelerated change is the new normal, and for businesses, the rate and the scope is staggering. Not only are organisations dealing with quickly evolving technologies, they’re racing to keep up with shifting customer behaviours and the lightening-fast pace of industry disruptors. To thrive in this environment, many industries are looking at innovative ways to invigorate Read More…

  • March 27 2017 Four ways social media managers can protect their company’s accounts against hackers

    These days, everyone is on social media, and customers expect you to be too. No matter what industry you’re in, if you don’t have a social media presence, you may not be visible or accessible to a large proportion of potential customers. However, once you’re up and running, a worrying issue that social media managers Read More…

  • March 27 2017 Three ways scammers will try to prey on your brand – and how to avoid being outsmarted

    As 2017 rolls on, cyberattackers will continue to exploit and severely damage Australian businesses by targeting their people, brands, and customers. According to PricewaterhouseCoopers (PwC), 65% of local organisations have experienced cybercrime in the last 24 months. There are no signs this will slow down as attackers become more savvy, more knowledgeable, and more socially Read More…

  • March 6 2017 Small to medium businesses are never ‘too small’ to be at risk of cyber security attacks

    Small to medium-sized businesses (SMBs) make a significant contribution to the Australian economy.  According to the Australian Bureau of Statistics, as at June 2015, there were 2,066,086 small businesses nationwide.*(1).  In some states such as Western Australia, small businesses represent 97% of all businesses.*(2) Cyber security is as important for these companies as it is for large Read More…

  • January 10 2017 Identify theft costs businesses $221b per year… what can you do to protect your operation?

    Identity theft is a well-known threat and not just for individuals – businesses, both big and small, are also at risk. In fact, the Aberdeen Group has found that it costs the global business community roughly US$221 billion annually. For criminals, targeting unsuspecting businesses for identity theft is an attractive undertaking because its highly lucrative and, by comparison, the risks are minimal.  Read More…

  • January 9 2017 Don’t let your security spend amount to nought – address the risk of shadow IT

    By 2020, one in three successful cyber-attacks on organisations will be via shadow IT (Gartner) – in other words, the apps and software employees use without their employer’s approval or authorisation. According to Vaughan Klein, Regional Manager of Collaboration at Cisco Australia and New Zealand, the billions of dollars Australian businesses invest in security annually Read More…

  • December 19 2016 Information security: A team sport for SMBs

    Due to the increasing prevalence of cyberattacks on SMBs, information security has never been more important. When it comes to mitigating security risks, soccer – arguably the world’s most popular team sport –  is full of useful insights for these businesses. Specifically, the key positions on a soccer roster are analogous with the different information security roles people play in Read More…

  • November 23 2016 Prove you’re not a sitting duck for hackers

    The Internet has affected how we learn, work and live. It is inseparable from almost everything we do nowadays. Businesses, even small ones, now rely on tools requiring a connection to the Internet. For instance, the Point-of-Sale machine has completely replaced manual cash registers, allowing payment via debit card and credit cards. Sales and payment Read More…

  • October 10 2016 The security challenge of insider threats

    Australian businesses spend considerable time and money protecting themselves from external security threats, but it’s important to remember that there are also threats within. While viruses, phishing and ransomware attacks are constantly top-of-mind when it comes to securing IT infrastructures, steps must also be taken to protect them from staff.  Unfortunately, they can cause just Read More…

  • September 26 2016 No chance for traditional security solutions in countering the ransomware threat

    It’s been circulating for more than a decade, but now ransomware is becoming an increasing problem for businesses of all sizes. Designed for financial gain, ransomware attacks involve malicious code that infiltrates a victim’s computer or a company’s server infrastructure and encrypts stored data. The first a victim knows of the attack is when a Read More…

  • September 22 2016 Poor security ‘hygiene’ persists despite rise in threat awareness due to major cyberattacks

    Headline-making cyberattacks have driven significant increases in cyber security awareness in the business world but this hasn’t necessary led to best practice security measures being enforced, according to CyberArk.   The information security company commissioned independent research firm Vanson Bourne to undertake a survey of 750 IT and IT security decision makers, worldwide, examining whether Read More…

  • September 12 2016 SMB management: tips for taking the best care of your growing data volume

    Data storage is an important issue to any business, but it is especially important to growing companies. If your business is like most, you probably have scads of data that needs to be stored and protected. Many small businesses either ignore or do not take into account the fact that, as you grow, you will Read More…

  • September 9 2016 Why a well-designed IT disaster recovery and business continuity plan is essential

    No one wants to think about disasters but they do happen, far more often than expected. IT risks to your business include hardware and software failure, human error, spam, viruses and malicious attacks, as well as natural disasters such as fires, cyclones or floods. According to a survey conducted by the Disaster Recovery Preparedness Council Read More…

  • August 30 2016 5 security checks before starting a part time work from home job

    More and more people are choosing to create wealth from the comfort of their homes. It’s a move that also helps them to strike a balance between the demands of their professional and personal lives. While it’s a potentially lucrative career move, there is also a risk of falling prey to job scams.   Here is a Read More…