Building a cybersecurity tech stack: The importance of a multi-layered approach

Posted by Craig McDonald on 15 February 2019 10:08:50 AEDT

As a cybersecurity leader, I frequently get asked by business owners about how to build a cybersecurity tool stack that can combat current and future threats to a business. Choosing the right tech stack is hard, balancing budget pressures against your needs to get the best bang for your buck.  

Read More

Why personal phones at work are risky business

Posted by Craig McDonald on 07 February 2019 15:33:22 AEDT

Does Bring-Your-Own-Device (BYOD) make sense for your business? With the potential for cost and time savings becoming increasingly evident, the chance for your staff to use their own devices to do work (especially away from the office) may be an exciting prospect.

Read More

How Hannah in HR Can Cause a Data Leak Disaster: The Evolving Complexity of Business Email Compromise

Posted by Craig McDonald on 01 February 2019 14:41:40 AEDT

Here’s a hypothetical example of a commonly observed type of email fraud:

Read More

Attracting top cybersecurity talent: Building a stellar team

Posted by Craig McDonald on 01 February 2019 13:27:48 AEDT

According to the 2019 Annual Cybercrime Report by Cybersecurity Ventures, cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.

Read More

Is your business prepared to handle a sudden email outage? Today?

Posted by Craig McDonald on 25 January 2019 14:56:14 AEDT

What would be the consequence if your business’ email was not accessible for 30 minutes? How about a full day? A week?

Read More

Aligning your organisation to tackle cyber risk, and why it must start at the top

Posted by Craig McDonald on 21 January 2019 15:48:37 AEDT

For better or for worse, cybersecurity continues to be a fundamental concern for businesses. In fact, 2018 was a year that saw a rise in both the number and complexity of cyberattacks. From Facebook to British Airways, brands from all over the world fell victim to cybercrime and made headlines on what seemed like a daily basis.

Read More

How Cybersecurity Is Evolving: The Real Lesson of Machine Learning

Posted by Craig McDonald on 11 December 2018 12:19:00 AEDT

Artificial Intelligence (AI) and machine learning are currently hot property, on the wish and hit lists of just about every company on the planet.

Read More

Breaking Through The Culture Of Denial: Why Business Leaders Need To Share Their Experiences

Posted by Craig McDonald on 28 November 2018 16:58:40 AEDT

Another day, another red-faced exec wondering how his company just managed to get scammed out of thousands of dollars. Embarrassing? Yes. Uncommon? No.

Read More

Silly (Shopping) Season is Upon Us

Posted by Craig McDonald on 22 November 2018 16:15:08 AEDT

It’s officially silly (shopping) season. Inboxes around the world are starting to fill up with crazy hot sales, festive deals, and year-end promotions.

Read More

Social Engineering: The Psychological Tools Of Cybercrime

Posted by Craig McDonald on 26 October 2018 08:05:00 AEDT

“How did I fall for that?”

Read More

The imitation game: email fraud, phishing & brandjacking

Posted by Craig McDonald on 23 July 2018 12:22:15 AEST

The term “imitation game” comes from a paper Alan Turing wrote in 1960 called Computing Machinery and Intelligence. Turing posed the question "Are there imaginable digital computers which would do well in the imitation game?"
While machines are now beginning to answer Turing’s question in the affirmative, the most dangerous copycats in the cyber-world are still humans.

Read More

Criminals targeting mobiles to hack into business data

Posted by Emmanuel Marshall on 28 May 2018 13:15:31 AEST


BYOD -
Bring Your Own Device- is standard practice now in most industries. Every person working in an office has a web-enabled phone in their pocket that can receive email and that’s increasingly the in-point for phishing scams. 

Read More

FBI stats: email fraud still #1 cybercrime

Posted by Emmanuel Marshall on 23 May 2018 12:29:31 AEST


The latest
report released by the FBI’s internet crime division - IC3 - reveals that email-based social engineering attacks were the most commonly reported cybercrime category in 2017.

IC3 received 300,000 complaints in 2017, representing estimated losses of more than US$1.4 billion.

Read More

One email can take down your business: social engineering

Posted by Craig McDonald on 05 March 2018 14:03:48 AEDT


Last December, cybercriminals stole millions of dollars from several law firms with a simple email scam.

The scammers phoned the lawyers and asked them for legal advice. After a conversation over the phone they promised to email the lawyers some ‘important documents’ related to their cases. When the lawyers opened the emails they found links that pointed to documents stored on an online file sharing site that required them to enter their email account passwords to gain access.

Read More

Social Engineering: Hacking + Psychology = Fraud

Posted by Emmanuel Marshall on 08 January 2018 11:55:41 AEDT


Recently
The Brisbane Times broke a story about cybercriminals who stole millions of dollars from Queensland law firms in December. This story is interesting because the cybercriminals involved didn’t hack into the lawyer's network or infect their computers with a virus - they just sent them an email.

Read More

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Subscribe to email updates

Recent Posts

Posts by Topic

see all