Cyber Security Is Easier Than You Think...

What sensitive client data are you keeping on your computers or devices?

Recently, we performed one of our complimentary security health checks on a new client, and we found that 40 credit card details were being kept in a spreadsheet on the reception computer. The potential liability cost listed is probably too modest.

The computer was also missing critical software updates and didn't have a current anti-virus/security software installed.

This is a common scenario for many businesses. People just don't know what they don't know.

What sensitive data are you keeping, that you don't need to, or that exposes you to risk?

It's never too late to start. Don't be ashamed if you have no idea about your security.

Cybersecurity is easier than you think. Just start with one thing.

Still not sure what to start with? Here are some of our recent posts that could be places to start:

Password Behaviour and Management

Multi-Factor Authentication

Or head on over to our FREE Resources page to see some of our Guides and helpful Checklists!

Network Detective EXCERPT

Network Detective EXCERPT

Myth Busted: Mac's Don't Get Viruses

A common IT myth that we like busting, is that "Macs don't get viruses."

Now the term "virus" is not used as often these days. Malware is the preferred umbrella term, simply because there are more threats than just viruses. Adware, ransomware, spyware, potentially unwanted programs (PUPs), to name a few.

In 2019 Macs saw an average of 11 threats per endpoint, to 5.8 threats for Windows machines, meaning threats for Macs per endpoint outnumbered Windows computers by 2 to 1. This is up 400 per cent from 2018.

The majority of Mac threats reported are Adware or PUPs, which are less harmful than say a ransomware attack, however, they are threats nonetheless, and adware is also the biggest threat to Windows computers.

With the increase of Mac users, it's no surprise that there is an increase in the number of threats.

So, Mac users, if you don't already have an antivirus, or better still, a complete security suite, please get one!

Credit: Techspot

Working From Home Tip 2: Getting The Most Out Of Your Internet

Working From Home Tip 2: Getting The Most Out Of Your Internet

Working From Home means an increased reliance on internet and mobile speed and reliability.

Unfortunately, the exact opposite is happening, as the network back end just doesn't have the capacity to cope with the increased demand. According to a 9 News report, Australia has had a year's worth of network usage growth in 3 days!

Read More

Working From Home Tip 1: Remote Meetings

Working From Home Tip 1: Remote Meetings

There is currently a battle between two juggernauts in the video meeting space - Zoom vs Microsoft Teams.

Zoom is fast becoming one of the most popular platforms. Security is questionable as there have been a number of vulnerabilities that have been exploited by hackers. Microsoft Teams is gaining popularity however with Teams also soon to be completely replacing Skype. Lets explore that some more…

Also being explored is some of the other contenders in this space, such as Google Hangouts, Cisco Webex, Intermedia Anymeeting, and Logmein Gotomeeting.

Read More

Cyber Attack Number 15/15: Crypto Mining Malware Attacks

Cyber Attack Number 15/15: Crypto Mining Malware Attacks

The final installment of our 15 part series, is a variation of the Cryptojacking attacks we spoke about in Part 13. The difference is that in this case hackers use malware to gain access to existing Crypto mining computers or exchanges to piggy back off them and mine their own Cryptocurrency.

Read More