Home Blog Page 3

Want to take control of your passwords?

Password Pitfalls
Password security is an age-old problem in today’s online world. However as we continue to see more and more cyber incidents and mega breaches in the news, its relevance is more significant than ever. This article offers some practical insights and advice for how you can better manage your passwords. Ultimately the intent is to help you understand how...

Losing something that you can never replace

Precious memories. They're loved for a very special reason - they happen once in a life time, and can never be replaced. Moments in time together with your boyfriend, girlfriend, life-long partner, brother, sister, parents / grandparents & extended family that you can recall in your head, but are made very real in an instant with photos or videos from...

Protect yourself with multi-factor

I still get a lot of people asking me about "multi-factor" or "two step"- so thought I'd share this so that everyone can make the most of using it to protect your accounts online. So how does multi-factor help? Let’s first explain some of the hacker techniques involved... Stop hackers from accessing your accounts with your compromised credentials The process the...

£100m fine for Marriot Hotel Group – an ICO muscle flex wake up call!

Marriot Group fine
The Marriott hotel group is to be fined around £100m by the Information Commissioner’s Office, after hackers stole records of more than 338 million guests. This is a huge wake up call for UK executives in all organisations - especially when they realise they were part of the breach! In November Marriott International, the parent company of hotel chains including Sheraton,...

Preparing for the “terrible 10” cyber scenarios

It's been hard to avoid the weekly barrage of IT security news stories and updates recently... Yet another big company hack, another data breach / or data leak. Some of the examples more recently have gained board level and senior exec interest - mainly I'd suggest due to impacted company CIOs, CISOs, and CEOs losing their jobs over these events, however...

5 Essential Cyber Security Best Practices To Follow As A Remote Employee

Advice for remote workers
5 Essential Cyber security Best Practices To Follow As A Remote Employee - from Forbes: https://www.forbes.com/sites/andrewarnold/2019/04/06/5-essential-cybersecurity-best-practices-to-follow-as-a-remote-employee/

OAIC releases Notifiable Data Breaches Quarterly Statistics Report & 12-month Insights Report

OAIC Notifiable Data Breaches Scheme 12 month insights report
Today, the Office of the Australian Information Commissioner #OAIC released their Notifiable Data Breaches Quarterly Statistics Report for the 1st January 2019 through to the 31st March 2019, as well as their 12-month insights report. Here's a quick summary of the insights released: There were 964 data breach notifications from the 1st of April through to the 31st of March. There's been...

Start taking back your online privacy by making these 4 easy changes

take back privacy
Some handy tips and advice for taking back your privacy... https://www.fastcompany.com/90346476/the-4-fastest-ways-to-protect-your-online-privacy-starting-right-now

Phone scammers impersonating Australian Cyber Security Centre

Phone Scammers
Another recent australian based scam to be aware of. If you get an unexpected telephone call from someone claiming to represent the Australian Cyber Security Centre who says your computer has been infected or hacked, hang up immediately. Never give anyone your personal information such as your bank account number, credit card details or passwords. Full details here: https://www.staysmartonline.gov.au/alert-service/phone-scammers-impersonating-australian-cyber-security-centre

Verizon’s 2019 Data Breach Investigations Report released

Verizon 2019 Breach Investigations Report
Verizon’s 2019 Data Breach Investigations Report has just been published - providing comprehensive, data-driven insights into what’s happening in cybercrime. The report combines information on data breaches and security incidents from 73 contributors around the world, to give a unique overview of the threat landscape, and current cybercrime trends. Key findings from this year’s report are as follows: · C-level executives are...