How to Use Multi-Factor Authentication: A Comprehensive Guide

Multi-factor authentication (MFA) is an essential component of comprehensive cybersecurity. By requiring multiple verification methods, MFA offers superior protection against unauthorised access to your accounts. This guide will explain the concept of MFA, discuss the mechanics behind rotating codes, and provide a general overview of setting it up across various platforms. Understanding Multi-Factor Authentication Before […]

How to Use a Password Manager: A Comprehensive Guide

Introduction Managing multiple accounts and passwords can be overwhelming. This guide will show you how to use a password manager, a simple tool that simplifies password management and enhances your online security. What is a Password Manager? A password manager is a digital tool that securely stores and manages your passwords for various online accounts. […]

Lessons and Solutions from APRA’s Cyber Resilience Study

The Australian Prudential Regulation Authority’s (APRA) recent cyber resilience study offers valuable insights that can serve as a roadmap for all businesses, regulated or not. Below are the key gaps identified by APRA along with guidance on how to address each. 1. Identification and Classification of Information Assets A significant gap identified in many entities […]

Hard Lessons in Cyber Resilience: Analysing the Medibank Data Breach and Its Aftermath

In October 2022, Medibank, one of Australia’s largest health insurers, suffered one of the most significant data breaches ever reported in the country, impacting basic account details of 9.7 million current and former customers. This devastating cyber incident has left the corporation facing repercussions not just in terms of reputation but also financially, as announced […]

The Role of Board Cyber Event Simulations in Effective Risk Management

long table with Eiffel chair inside room

Introduction Effective risk management is crucial for boards in navigating the complex realm of cyber threats. Board cyber event simulations have emerged as essential tools in assessing and fortifying an organization’s cyber defenses. In this blog post, we delve into the significance of these simulations in enhancing risk management for boards and strengthening their cyber […]

The Critical Cybersecurity Queries for Board Directors

As cyber security concerns continue to evolve in complexity and magnitude, they have undeniably moved from the confines of the IT department to the forefront of strategic boardroom discussions. The responsibility of safeguarding an organisation’s digital assets and ensuring its preparedness to defend, respond to, and recover from cyber threats rests on the shoulders of […]

The Cybersecurity Dilemma: Why Education is the Key to Balancing Security and Convenience

never stop learning, continuing education, learning

Introduction The cybersecurity dilemma is a persistent challenge in the realm of information technology: the more secure a system is, the less convenient it tends to be for its users. In the struggle to maintain stringent security without compromising usability, cybersecurity education and training have emerged as indispensable tools. Unpacking the Cybersecurity Dilemma At the […]

“Living Off the Land”: A Stealthy Cyber Threat in Your Own Backyard

Introduction “Living Off the Land” isn’t just a survival tactic for adventurers, it’s also a stealthy strategy adopted by cyber attackers. In the world of cybersecurity, this term refers to attackers exploiting legitimate, often pre-installed, tools within your system to perpetrate their malicious deeds. What makes it so cunning? They’re using your own resources against […]

Cautionary Tale: A Lesson in Business Protection

Cyber security is more important than ever for businesses of all sizes. A recent case involving two American investment companies highlights the risks involved when security measures are not robust enough to protect against determined cyber criminals. Let’s delve into this incident, examine the core themes, and consider some preventive measures. In this high-stakes case, […]

“Hide My Email”: An Essential Privacy Tool

scam, phishing, fraud

The surge in digital platforms usage has made data privacy a paramount concern for every internet user. From subscribing to a new service to shopping online, your email address is often shared more widely than you might like. That’s where the “Hide My Email” feature comes in – an innovation designed to keep your primary […]