Cyber Security Training

You don’t know what you don’t know . . .so who is responsible for teaching us?   I was browsing through Twitter on the weekend and a tweet by Gmail caught my attention. Not because of the content of the tweet. But because of the comments on that tweet. Many people replied to Google complaining…

Are you prepared for a security incident?

Introduction In February 2021, an Australian university was hit with a ransomware attack. The university quickly shut down its network to identify the infiltration, contain the breach and conduct a proper investigation. As a result, critical operations were offline, new enrolments were suspended and the university could not pay casual staff. A few days later,…

Defending against ransomware attacks

Introduction “Freeze, I’m Ma Baker. Put your hands in the air and give me all your money!” This snarling from Boney M’s “Ma Baker” song has, in today’s digital world, become: “All servers and working computers of your company have been hacked and encrypted. Your money or your data!” Imagine waking up in the morning…

Is your MacOS Safe?

Macs are safer, but… We often hear that Mac users are less likely to be targeted by cybercriminals. This statement is true because of several reasons: Apple’s macOS system is Unix-based, which makes it more difficult to exploit. Hackers simply chose to attack more popular platforms. According to NetMarketShare, Windows accounts for over 88 percent…

Defending Cybercrime as a Service (CaaS)

Introduction Have you heard of cybercrime as a Service? Australians have started the race to have 80% of the adult population fully vaccinated by the end of 2021. This is important because vaccination reduces the health, social and economic impacts of the COVID-19 pandemic. However, hackers don’t share the same morals as us. They see…

The Arcane Art of Attribution

  “Home and office routers come under attack by China state hackers, France warns” – Ars Technica headline. This story was shared in my team’s Slack channel a few weeks ago and prompted a short conversation about how do we know it’s China? Are we just checking the IPs on the incoming messages? What if…