Cyber Security Preview
PREVIEW:
Cyber Training & Awareness Videos
Want to train your staff in how to adapt to these common threats?
View the Cyber Procedures to Tailor and Implement Preview here.
Phishing
Phishing is when a user - like you - is ‘baited’ or tricked to reveal sensitive information (like usernames, password, or client data) to allow an attacker to breach the system, or steal funds and intellectual property.
Sniffing & MITM
A ‘Man in the Middle’ sniffing attack occurs when the attacker is intercepting communications between you and a legitimate service. e.g. your bank login details over the network. Attackers ‘sniff’ them out and steal them.
Malware
‘Malware’ is short for Malicious Software. It refers to software which is used to gain access to your system without you knowing it.
Compromised Credentials
The easiest way for a cyber-attacker to gain access to sensitive data is by ‘compromising’ the identity and credentials of an end user, like you. This allows them undetected access. If you are a “privileged” user with broad access, that could give out the ‘keys to the kingdom’.
DDOS and Ransomware
Have you experienced when the online service you are trying to access is un-workably slow or even crashes. A Distributed Denial of Service attack or DDOS can achieve that outcome. “Ransomware” has 2 parts. Firstly it prevents users from accessing their system or personal files. And Secondly, it demands payment be sent by cryptocurrency or credit card.
Cyber Security Legislation
In addition to financial and reputational damage, a Cyber incident may result in breaches of your general obligations in various sections of the Corps Act, ASIC Cyber Security Governance recommendations, and codes of conduct included in the Payment Card Industry Data Security Standard and Privacy Act.
View the Cyber Procedures to Tailor and Implement Preview
Not sure which option is right for your business?
Contact us, we can help!