If You Find a USB Drive – Destroy It!

Malicious USB

If you ever come across a USB or thumb drive, that you do not recognize, leave it where it is or destroy it. It may be one you found on the ground outside your office, in a public place or even one sent to you out of the blue. Yes you may be curious and want to return it to its owner or see what it contains but the risks are too high. Continue reading

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

The Biggest Vulnerabilities that Hackers are Feasting On Right Now

Software vulnerabilities are an unfortunate part of working with computers. A developer works hard to put out a software release with millions of lines of code. Hackers then look for loopholes that allow them to breach that code. Continue reading

Beware Of These Social Media Scams

Social Media Scams

You may think it is a bit of fun to type in your answers to the quiz, which asks silly questions such as your nickname and first model of car? You may think it is some plain old fun, but many of these social media questionnaires are set up by hackers to steal your identity. Continue reading

Staff Security Training

It is a sad but true fact that your employees are your number one cyber-security threat.

They are often the main gateway through which hackers gain their way into your business. All it takes, is one staff member clicking on one wrong link in an email, for cyber-criminals to get in. Continue reading

Cyber-crime Is Now the World’s Biggest Crime

Do Macs Get Viruses?

The most reported crime in the world right now is cyber crime and online fraud. This blog article explains the risks to businesses and provides a way in which you can help protect your business. Continue reading

8 Cyber Security Tips To Help Secure Your Business

Do Macs Get Viruses?

Cyber security and Internet attacks has been all over the Australian media recently after the recent press conference from The Prime Minister – Scott Morrison. During the press conference, he mentioned that Australian Businesses, government agencies and other entities are under an active cyber attack campaign by a “state-based actor”. Scott didn’t elaborate too much on who they are but urged businesses to check and if needed increase their cyber security. Continue reading

Are You Protected Against Leakware?

Leakware or extortionware

You should have heard about ransomware by now. Cyber-criminals access and encrypt your data and you have to pay a “ransom” for the key to unlock your data. If you have a backup you can revert to that and forget about the hackers threats. Leakware (also known as extortionware) is similar, but now the bad actors are threatening to post your confidential information online if you don’t pay up. Continue reading

What is a Firewall and Why Do They Matter?

Hearing “firewall” in the context of computing can be confusing.  This blog article aims to explain what a firewall is and how it will benefit your business. Continue reading

How the Bad Guys Get Your Passwords

Password thiefPasswords are an essential part to your businesses cybersafety. If, like the rest of us, you have dozens of passwords to remember, you might take shortcuts. Taking advantage of this type of attitude is one way bad guys access your passwords. Continue reading