cybersecurity australia

Australia’s controversial anti-encryption bill passes into law

The Australian government has passed the controversial and mind-bogglingly complex Access and Assistance Bill 2018 into law. The opposition Labor party shelved its plans to improve the scheme and waved it through in response to overwhelming pressure from the Liberal-National Coalition government, desperate to see it made law before Christmas. Since it gives authorities the right to demand access to…

network security

Majority of Cybercrime Damage is Caused by a Few, Powerful Criminal Threat Groups

A small subset of professional criminal actors is responsible for the bulk of cybercrime-related damage, employing tools and techniques as sophisticated, targeted and insidious as most nation-state actors, says the State of Cybercrime Report 2018. These sophisticated and capable criminal gangs operate largely outside of the dark web, although they may leverage low-level criminal tools occasionally…

phishing emails

A Reminder! Phishing Emails

Just a reminder to everyone to be constantly vigilant of fake emails which are trying to obtain your personal information (phishing) or infect you with malware. We cannot emphasise enough, the importance of being both aware and sceptical of emails you receive. A recent example we have seen is this ANZ bank email. If you…

Staying Safe Online – Three Rules

Just about everyone in the security industry has written a set of “rules for online safety” – so I thought it was about time to do the same.  There’s plenty of good reasons to think that any quick fix is snake-oil (especially when written by a vendor) and that any article less than 100 pages…

Avoid Identity Theft

Safeguarding Against Identity Theft in Australia: A Modern Framework for Organisations

Safeguarding Against Identity Theft in Australia: A Modern Framework for Organisations Identity theft continues to surge as a significant security risk in Australia, affecting millions of citizens every year. The Australian Federal Police categorise identity theft as a rapidly evolving criminal challenge. Given this landscape, it becomes crucial for organisations like ours to remain unceasingly…

Data Privacy

Navigating the High Seas of Data Protection

The Pirate’s Guide to ‘Privacy by Design’: Navigating the High Seas of Data Protection Ahoy, savvy data wranglers! If ye ever felt like ye were navigating stormy seas when it comes to the treacherous world of privacy, ye’re not alone! Avast, gather around me hearties, because today we talk about the secret treasure map called…