The global COVID-19 outbreak has changed our community overnight and forced a large portion of the workforce to work from home. We are seeing businesses and employees adjusting: my local HIIT gym are now providing classes online, our favourite restaurant is now doing home deliveries, and we’ve started picking up goods via drive through at […]
There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of […]
Transcript Trent: Thanks for joining us Dave David: Thankyou Trent Trent: Good to see you David: Glad to be here mate Trent: I’ve got a question for you it’s from the news recently and it’s about a data breach in the health industry in Victoria.
Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.
Got an email from the CEO requesting urgent payment of an invoice (or something similar)? Don’t rush in to get the job done, because you might just be participating in a clever new social engineering hack. In other words, that email might not be from the boss at all.
Trent: Hi there welcome back to Techscoop thankyou for joining us and today you’re in for an absolute treat because once again I’m joined by Ryan Economos from mimecast and we’re talking about the evolution of attacks, this week I want to talk about hwy it’s so hard to stay ahead of all of these […]