Cyber Attack Vectors 2022; where marketing and reality diverge
Read More: Cyber Attack Vectors 2022; where marketing and reality divergeCyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report with a not surprising result to many cyber security professionals. Human Error is the number One source of cyber breach The number one attack vector “Cyber attack” is in-fact Human…
99.9% reduction in risk from cyber attack, the best ROI available in cyber
Read More: 99.9% reduction in risk from cyber attack, the best ROI available in cyberMulti Factor Authentication or MFA for short, is an additional security measure (Factor) added after an authentication attempt has occurred to ensure that the “entity” who entered the user name and the password is in fact the entity that should know the user name and the password.
ACSC Essential Eight #1
Read More: ACSC Essential Eight #1Commence your cyber security resilience journey with the ACSC Essential eight, the ACSC is short for the Australian Cyber Security Centre and the ACSC the central source for all things related to the Australian Government cyber security strategy. The ACSC is not the sole source of truth and most of the ACSC recommendations do relate…
The problem is NOT Cyber security!
Read More: The problem is NOT Cyber security!The “Compliance with the NSW Cyber Security Policy” special report released on the 28th October 2021 should be a serious concern to every NSW resident who has their Personally Identifiable Information being “securely” held by a government agency. Vic, NSW, QLD, SA, NT and TAS could very likely be transposed with NSW and these findings…
101 Cyber security primer
Read More: 101 Cyber security primerCyber Security assessments are critical to understanding where your organisation is maturity wise.