Craig McDonald

Craig McDonald

Recent Posts

Preparing For A Cybersecurity Attack: Is Compromise Inevitable?

Posted by Craig McDonald on 20 September 2021 13:32:31 AEST

Compromise can happen to anyone. It’s no longer a case of ‘If a cyberattack hits my business’ but ‘A cyberattack will hit my business’. We have come a long way from the thinking that only certain types of businesses (or business functions) could be the recipient of a cyberattack. Most security professionals now assume that a breach is inevitable and prepare accordingly.

Read More

Password Best Practise: A Must-Have Layer of Cyber Defense

Posted by Craig McDonald on 25 August 2021 13:19:46 AEST

We all use passwords. In fact, we need them to access almost any online device. They are the key to retrieving sensitive data, whether it be online banking, classified company documents or social profiles, such as LinkedIn. They’re the first line of defense to protect crucial information, and often the most vulnerable. It’s not surprising then, that cybercriminals often create phishing scams to steal password credentials in order to procure data for use in criminal activity.

Read More

To Pay a Ransom? The Debate Rages On

Posted by Craig McDonald on 02 August 2021 16:53:33 AEST

As I write this, the threat of Ransomware is rapidly on the rise. So much so that the Australian Federal Police has formed a task force - Operation Orcus - following in the footsteps of the US Government, in an attempt to combat the specialised criminal infrastructure that is wreaking havoc across large scale organisations here and globally. High profile victims such as Nine Entertainment, JBS and Uniting Care, along with the recent Kaseya interception have been making headlines and may continue to do so without superior intelligence targeting organised crime groups.  

Read More

The anatomy of a phishing email scam: How social engineering techniques trick users

Posted by Craig McDonald on 17 June 2021 16:19:05 AEST

A personalised and targeted email, an opportune offer and the impersonation of multiple brands – some of the techniques employed by cybercriminals in a phishing email scam that resulted in a property buyer losing thousands of dollars as part of a ‘deposit’, supposedly for his new apartment.

Read More

Ransomware: To pay or not to pay? 5 factors to consider

Posted by Craig McDonald on 28 May 2021 09:00:41 AEST

Your business data is being held hostage, encrypted with only your attackers holding the keys. So, do you pay up the ransom, or try to recover without handing over company profits to cybercriminals?

Read More

The dreaded 3am phone call: Lessons from the cyber-attack on Nine Entertainment Co.

Posted by Craig McDonald on 13 April 2021 09:31:14 AEST

It’s been called the “largest cyber-attack on a media company in Australia's history," something that has never been seen before in the country. 

Read More

Cybersecurity in 2021: Trusting in Zero Trust

Posted by Craig McDonald on 23 March 2021 16:17:11 AEDT

Commenting on paradigm shifts in cybersecurity in 2020, Ann Johnson, Corporate Vice President, SCI Business Development at Microsoft wrote: 

“As we look past the pandemic to a time when workforces and budgets rebound, Zero Trust will become the biggest area of investment for cybersecurity. This means, that right now, every one of us is on a Zero Trust journey—whether we know it, or not.” 

Read More

First Blackbaud, then SolarWinds. Supply chain cyber-attacks are proliferating – how secure is your business?

Posted by Craig McDonald on 25 February 2021 11:43:59 AEDT

In the final weeks of 2020, news of the SolarWinds hack broke – a cyber-attack that has been dubbed as “the Pearl Harbor of American IT”.   

Read More

FTC: Reports related to identity theft doubled in 2020. This Identity Theft Awareness Week, let’s renew our efforts to protect our business data.

Posted by Craig McDonald on 05 February 2021 13:58:16 AEDT

This week marks Identity Theft Awareness Week, a public awareness campaign by the U.S. Federal Trade Commission (FTC) dedicated to mitigating the impact of identity theft. The week comprises a series of events organized by the FTC and its partners that focus on reducing the risk of identity theft and on concrete steps to recover if identity theft occurs.

Read More

New year, (not so) new cyber threats: Is your business’ remote working policy ready to tackle the security challenges of 2021, and beyond?

Posted by Craig McDonald on 28 January 2021 09:21:30 AEDT

Among other things, 2020 reminded us how fundamental cybersecurity is to business continuity.

Read More

Aussie firms under attack: 3 ways cybercriminals are exploiting your team’s trust

Posted by Craig McDonald on 11 December 2020 12:18:45 AEDT

Earlier this year, I wrote about the need for Australian businesses to step up their efforts in defending themselves from Business Email Compromise (BEC) attacks.

Read More

Staying Cyber Safe in 2021 & Beyond: Key insights from Microsoft leaders  

Posted by Craig McDonald on 27 November 2020 13:32:15 AEDT

One of the biggest challenges in cybersecurity is keeping up with the new attacks that criminals are creating.

Read More

‘Tis the season to be phished: 4 cyber tips for your employees as Black Friday & Cyber Monday sales begin

Posted by Craig McDonald on 25 November 2020 14:42:06 AEDT

In a year gutted by a worldwide pandemic, the 2020 year-end holiday and shopping season will be unlike any other.

Read More

Cyber villains are thriving IRL: Towards our digital future, are we there yet?

Posted by Craig McDonald on 20 October 2020 12:42:49 AEDT

Neil Stephenson imagined a meta-verse in his 1992 novel, Snow Crash. A vision of an interactive computer-generated reality or virtual world. A fully immersive persistent experience that we are all plugged into. Maybe we’re not there yet, but we are far closer today than we were pre-pandemic, and it’s a scary peak into the future power that cyber villains may wield.

Read More

5 cyber reminders to share with your employees this Cybersecurity Awareness Month

Posted by Craig McDonald on 12 October 2020 17:24:25 AEDT

It’s October again, an important month on the cybersecurity calendar as the world marks Cybersecurity Awareness Month (CSAM).

Read More

    Something Powerful

    Tell The Reader More

    The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

    Remember:

    • Bullets are great
    • For spelling out benefits and
    • Turning visitors into leads.

    Subscribe to email updates

    Recent Posts

    Posts by Topic

    see all