Home Blog

Top 10 proactive steps to protect yourself from identity takeovers & fraud

When I tell people I meet outside of work what I do for a living, the conversation often evolves into questions about practical steps I recommend in order to protect against identity takeovers and fraud. Unfortunately I sometimes also meet people who have become victims of fraud, and wished they had known what to do in advance, hence why I...

Inspiring cyber / privacy books, podcasts, documentaries and websites

cyber security privacy books podcasts sites
I often get asked by friends and colleagues for recommendations on latest info to read / listen to for all things cyber & privacy, or interesting & inspiring material to read up on. I therefore decided it would be useful to share this more broadly, hence this page. Here's my latest recommendations: "Darknet Diaries" Podcast by Jack Rhysider. A mix of...

Apple and Google Partner Up to Offer Covid-19 Contact Tracing

Apple Google Partnership for contact tracing

#StaySmartOnlineWeek – Steps to lock down your online security

In the spirit of #staysmartonline week which runs from Monday the 7th to the 13th of October 2019, I thought I’d share some handy cyber tips to help lock down your online security. By sharing this information, I want to ensure everyone can proactively protect themselves from cyber-crime, and the most common threats online. It's not hard to do - just...

OAIC releases Notifiable Data Breaches Quarterly Statistics Report & 12-month Insights Report

OAIC Notifiable Data Breaches Scheme 12 month insights report
Today, the Office of the Australian Information Commissioner #OAIC released their Notifiable Data Breaches Quarterly Statistics Report for the 1st January 2019 through to the 31st March 2019, as well as their 12-month insights report. Here's a quick summary of the insights released: There were 964 data breach notifications from the 1st of April through to the 31st of March. There's been...

Cyber Careers Advice

I've hired a number of grads in my career, plus placed various contractors and perms, - so I often have various scenarios where people pick my brain for advice on how best to get into cyber security. I therefore figured it would be best to write up some of my views and advice here, so more people who want to...

Preparing for the “terrible 10” cyber scenarios

It's been hard to avoid the weekly barrage of IT security news stories and updates recently... Yet another big company hack, another data breach / or data leak. Some of the examples more recently have gained board level and senior exec interest - mainly I'd suggest due to impacted company CIOs, CISOs, and CEOs losing their jobs over these events, however...

Recovering from a malware infection

Even the smartest people fall for the common cyber tricks From time to time I sometimes hear from old friends or work colleagues or people I've presented to who have been directly impacted by cyber crime, and need some help or advice. Be it they've fallen victim to a phishing email and have been infected with some form of ransomware...

Roblox Parents Primer

Roblox now has 36.2 million active users (as at March 2021) - so it's more than likely your kids may already know about this online game. This article provides you with everything you need to know as a parent, and what to watch out for: Roblox is an awesome game that your kids will love, and if they haven't told...

How to protect yourself online

Mr Robot
In a time where companies, celebrities, and even governments are frequently coming under cyber-attack, getting hacked might seem inevitable. The good news however, is that you can do something to protect yourself, your family, and your work by following just 5 essential cyber tips. These tips stop hackers like those seen in Mr Robot in their tracks. So what’s...

Protect yourself with multi-factor

I still get a lot of people asking me about "multi-factor" or "two step"- so thought I'd share this so that everyone can make the most of using it to protect your accounts online. So how does multi-factor help? Let’s first explain some of the hacker techniques involved... Stop hackers from accessing your accounts with your compromised credentials The process the...

Crying Baby Social Engineering

This is a great example of how human manipulation can easily trick someone into doing something they shouldn't. A crying baby and convincing friendly female voice is sure to get someone doing something they shouldn't. This video brings this technique to life!

Marc Goodman – a vision of crimes now, and in the near future

Scary wake up call looking at the darker underbelly of tech and society...