Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack – Part Three

The final article in a three-part series outlining the ideal multi-level cybersecurity plan to implement to protect your business from cyber attack. Did you know that 66% of business found that cyber-attacks were caused by insiders either inadvertently or intentionally? Despite the best multi-level security plan in place, it’s the “human” factor that can leave Read more about Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack – Part Three[…]

Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack – Part 2

Part-two in a three-part series outlining the best multi-level cybersecurity plan you can adopt to protect your business from cyberattack. We’ve all heard the horror stories about cybercrime. There are the news reports about the large-scale ransomware attacks like Wannacry that affected 400,000 devices globally. Then there’s the small business down the road who forgot Read more about Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack – Part 2[…]

Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack

Part one in a three part series outlining the best multi-level Cybersecurity Plan you can adopt to protect your business from Cyberattack. In 2014 former Distribute.IT co-founder Carl Woerndle and his brother Alex lost their multi-million dollar business and their family homes due to a cyber-attack of unprecedented proportion. Distribute.IT was a business that was Read more about Why Anti-Virus Software Isn’t Enough To Protect Your Business From Cyberattack[…]

Cisco Cybersecurity Report 2018

Cisco Cybersecurity Report 2018

For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, their latest annual cybersecurity report, Cisco presents data and analysis from Cisco threat researchers and several of their technology partners about attacker behaviour observed over the past 12 to 18 months. You can continue reading the 2018 Cisco cybersecurity Read more about Cisco Cybersecurity Report 2018[…]

Talk Business Tech Data Breaches Image

What You Need To Know Now About the Notifiable Data Breaches Act.

Many organisations’ hearts are palpating loudly as the deadline to get ready for the Privacy Amendment – Notifiable Data Breaches Act 2017 looms ever nearer. Coming into effect on February 23rd, now is the time to take action before you’re neck-deep in a data disaster and inadvertently end up with a $1.8M fine. The Privacy Read more about What You Need To Know Now About the Notifiable Data Breaches Act.[…]

talk business technology - apple mac

Apple Mac software has login flaw that puts private data at risk

“Apple customers have discovered a significant security flaw in the latest version of the operating system for Mac computers that allows anyone to log in without a password, potentially making private user data vulnerable.” Read more here: https://www.brisbanetimes.com.au/technology/apple-mac-software-has-login-flaw-that-puts-private-data-at-risk-20171129-gzuxmm.html

CryptoLocker - Talk Business Technology

Here’s What You Need To Protect Yourself Right Now From CryptoLocker Ransomware

It’s about 8:30 at night you are just finishing up the dishes after dinner. You receive three missed calls from one of your employees. Something must be wrong for her to call that often, this late at night. You ring back and discover that all of the company files are being held to ransom. Not Read more about Here’s What You Need To Protect Yourself Right Now From CryptoLocker Ransomware[…]

Is your Business Network Secure? Answer is Possibly Not

2014 Kaspersky Security Bulletin (Key Point Summary) 1.85 MB Download 2014 Kaspersky Security Bulletin 7.72 MB Download Every day thousands of attacks are made on individuals and businesses around the world. Australia is the 11th most attacked/hacked nation in the world and Brisbane is only 2nd to Sydney as the most attacked city in Australia Read more about Is your Business Network Secure? Answer is Possibly Not[…]

Repelling the Cyber Attackers

For many businesses, the next wave of innovation and growth will likely involve intelligent analytics, rich mobile experiences, and “one touch” processes that require no further manual intervention. Success will depend on maintaining trust: consumers and business customers alike will accept nothing less than a complete assurance that the companies they engage with protect their highly sensitive data carefully in the Read more about Repelling the Cyber Attackers[…]