From Backup to resilient cyber security
Read More: From Backup to resilient cyber securityIn the Beginning From Backup to resilient cyber security: Best practises for Information Technology such as “Least privilege access”, “Admin account segregation”, “Operating system patching”, “Multi-factor authentication”, even “Patching and updating applications” have been around for many years, undertaken as ritual by many Information Technology departments within businesses across Australia as best practise maintainence, without…
Protecting Australian Business from Cyber Crime
Read More: Protecting Australian Business from Cyber CrimeProtecting Australian Business from Cyber Crime, easy title to write and a topic beyond complex to implement for many small to mid sized businesses in 2022, Australia. The secret is that it is not complex to get started on a cyber security journey, it is easy to do the basics and reduce the risk of…
Follina 0 day – Office lets the bad guy waltz right in, WRTF!
Read More: Follina 0 day – Office lets the bad guy waltz right in, WRTF!Follina 0 day – Microsoft Office Macro protection eaten for breakfast!, those of you who know me, know that I embrace Microsoft Defender as a security tool that is top notch, not just my view but the view of the analysts that report on cyber security as well, here for example with the Mitre Evaluations…
Cyber Attack Vectors 2022; where marketing and reality diverge
Read More: Cyber Attack Vectors 2022; where marketing and reality divergeCyber Attack Vectors 2022; where marketing and reality diverge. The Identity Theft resource centre ‘Q1 2022 Data Breach Analysis’ report is an interesting 2022 report with a not surprising result to many cyber security professionals. Human Error is the number One source of cyber breach The number one attack vector “Cyber attack” is in-fact Human…
PASS – Mandatory 25 NSW Government report
Read More: PASS – Mandatory 25 NSW Government reportPASS – Mandatory 25 NSW Government report. Mandatory 25 NSW Government requirements: Personally as an Australian by choice so proud to find out that the government of Australia is creating material like the “‘Mandatory 25’ Requirements for Cyber Security”, proving that Australia is taking cyber security seriously across government at all levels. I have attached…
“Statisticising” cyber security
Read More: “Statisticising” cyber securityLast night I went fishing in our new boat and we caught 2 Dusky Flatheads, ugly but a great eating fish, sorry I digress but it seemed important at the time, here they are – we had no time to name them: Sorry I got distracted – a challenge with the modern day, living in…
55% of kiwi businesses fall “victim”
Read More: 55% of kiwi businesses fall “victim”I still hate statistics especially when those stats point to something that is so blatantly “not true”! 55% of kiwi businesses fell “victim” to a ransomware attack? How about a more accurate statistic (sorry), 100% of Kiwi businesses received a ransomware loaded email…. even one ransomware loaded email per day! both are pointless and yet…
Board level: concepts and explanations
Read More: Board level: concepts and explanationsHave you ever “lost” you audience when presenting a solution to your board of directors? no matter how hard you try to explain why your company needs this cyber security widget or process, they do not understand “your” urgency nor accept what you are explaining? Try this at home when you are passionate about a…
ACSC Essential Eight #1
Read More: ACSC Essential Eight #1Commence your cyber security resilience journey with the ACSC Essential eight, the ACSC is short for the Australian Cyber Security Centre and the ACSC the central source for all things related to the Australian Government cyber security strategy. The ACSC is not the sole source of truth and most of the ACSC recommendations do relate…
The problem is NOT Cyber security!
Read More: The problem is NOT Cyber security!The “Compliance with the NSW Cyber Security Policy” special report released on the 28th October 2021 should be a serious concern to every NSW resident who has their Personally Identifiable Information being “securely” held by a government agency. Vic, NSW, QLD, SA, NT and TAS could very likely be transposed with NSW and these findings…