Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. This is alarming both in scale and because many people aren’t yet protecting smartphones. For years, mobile phones have become more powerful. They now do many of the same functions as a computer – just […]
Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When you go on a trip, not having your tech there when you need it can ruin your day. Travel smarter and more securely by doing several checks before you go. […]
🥊Threat Hunting with Sysmon As Cyber Threats continue to evolve, it is vital to have tools and strategies in place to detect and respond to malicious activity on our systems. One such tool is Sysmon, a system monitoring tool that can help detect and identify suspicious behaviour. Below we will explore how Sysmon can be […]
🎁 5 tips for safe online shopping this Christmas: 👀 Use a secure payment method to protect your personal and financial information. Some options include using a payment service like PayPal or a digital wallet like Apple Pay or Google Pay. 👀 Shop with reputable retailers: It’s important to shop with retailers you know and […]
⚙ Advanced Cyber Security solutions of today do great, but why not start from the basics with those two #quickwins? 👉If you’re on Office 365, consider dumping Dropbox and start using OneDrive for Business. Dropbox is great – except for the security requirements that are needed in an enterprise; plus, it can’t compete with the integration […]
❗ Security alert ❗ Citrix has just announced a vulnerability discovered in Citrix Gateway and Citrix ADC. Citrix ADC or Citrix Gateway appliances configured as a SAML SP or a SAML IdP are affected by the CVE-2022-27518 vulnerability, which allows unauthenticated remote arbitrary code execution. The following supported versions of Citrix ADC and Citrix Gateway are affected by this […]
🔒There has never been a more crucial time to secure our data, devices and people’s corporate identities. With the advent of cloud computing and remote working, employees and freelancers can access company information from any location. This presents a problem for businesses that need personnel to be able to access sensitive data securely wherever they […]
Nearly all organisations own some form of NAS storage device that they use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server, and thirdly, as a hypervisor to host Virtual Machines. In this post, we focus on applying the best practices to such devices regardless […]
What is an MFA Fatigue Attack? An MFA Fatigue attack is a strategy used by threat actors to abuse sign-in security by forcing users to grant them access to get relief from the MFA flood. The method is also known as MFA bombing and is considered a high-profile attack. How it works This strategy, combined […]
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit. What is an Air Gap Backup? Air Gap Backup is an effective data protection strategy used to take backup copies off infrastructure and keep them offline, thus, making them inaccessible […]
It appears two new Microsoft Exchange Zero-Day vulnerabilities are being exploited in the wild. While the exploitation is not yet confirmed, attacks have been launched on fully patched Exchange servers affecting companies and organisations. If you run Microsoft Exchange on-premises and have Outlook Web App (OWA) facing the internet, the chances are you are impacted. […]
This infographic is about the 10 top types of Phishing Attacks as of today, September 2022.
Two weeks have been left for Australian businesses to make use of the priority registration period and register their domain names under the .au extension. From 20th September 2022, the way we register domain names in Australia is changing, and below is what you should know. What you should know about the change After this […]
This infographic is about the 6 most common Phishing Attacks and how they can be detected.