Gemma Crawford

Stay informed with our cyber security monthly roundup for September

CYBER SECURITY MONTHLY ROUNDUP – SEPTEMBER 2024 September 2024 continued the disturbing trend of escalating cyber threats, with new and sophisticated attacks emerging at an alarming rate. Ransomware remained a persistent menace, targeting small and medium-sized businesses with the healthcare sector remaining the prime target. Data breaches continued to expose sensitive information, while supply chain […]

Stay informed with our cyber security monthly roundup for September Read More »

SECURING THE MODERN ENTERPRISE: A GUIDE TO THIRD-PARTY RISK MANAGEMENT

Beyond Your Perimeter: Managing Third-Party Risk in the Modern Enterprise The Benefits of Effective Third-Party Risk Management Third-party relationships are essential for growth and innovation. However, these partnerships also introduce new security risks accelerating the growing need for third-party risk management. Think of your business as a fortified structure. Third-party partners are like the merchants

SECURING THE MODERN ENTERPRISE: A GUIDE TO THIRD-PARTY RISK MANAGEMENT Read More »

ENCRYPTION IN SIEM TOOLS: A DEEPER DIVE

Understanding the Role of Encryption in SIEM Security Information and Event Management (SIEM) tools are critical for detecting and responding to cyber threats. By centralising security data from various sources, SIEMs provide a comprehensive view of network activity. Encryption plays a crucial role in safeguarding this sensitive data. Encryption Points in SIEM Data Ingestion: Log

ENCRYPTION IN SIEM TOOLS: A DEEPER DIVE Read More »

ENCRYPTED DATA: The Cybersecurity Powerhouse for a Stronger Security Posture

Encryption: The secret weapon against cyber threats Understanding Encryption And Why It Is Important The past two years in Australia have witnessed a surge in major data breaches, highlighting the urgent need for robust cybersecurity measures. These incidents have demonstrated the devastating consequences of neglecting data security, from large-scale retail breaches to sensitive government data

ENCRYPTED DATA: The Cybersecurity Powerhouse for a Stronger Security Posture Read More »

WE ARE EXCITED TO INTRODUCE OUR NEWEST OFFERING: SENDSAFELY END-TO-END ADVANCED CYBER SECURITY SOLUTION.

WE ARE EXCITED TO INTRODUCE OUR NEWEST OFFERING: SENDSAFELY END-TO-END ADVANCED CYBER SECURITY SOLUTION. Enhancing your Cyber Security Posture and Safeguarding your Data- Register for a Demo Now! In today’s digital age, safeguarding sensitive information is paramount. We understand the growing concern surrounding data breaches and unauthorised access. That’s why we’re thrilled to announce our

WE ARE EXCITED TO INTRODUCE OUR NEWEST OFFERING: SENDSAFELY END-TO-END ADVANCED CYBER SECURITY SOLUTION. Read More »

A Critical Vulnerability in Chrome’s V8 JavaScript Engine

A Critical Vulnerability in Chrome’s V8 JavaScript Engine A significant security flaw, identified as CVE-2024-5830, has been uncovered in Chrome’s V8 JavaScript engine. Initially reported in May 2024, this vulnerability could allow attackers to execute arbitrary code on a user’s device simply by visiting a malicious website. The vulnerability stems from a type confusion error

A Critical Vulnerability in Chrome’s V8 JavaScript Engine Read More »

Generative AI: A New Weapon in the Cybercriminal Arsenal

A Critical Vulnerability in Chrome’s V8 JavaScript Engine A significant security flaw, identified as CVE-2024-5830, has been uncovered in Chrome’s V8 JavaScript engine. Initially reported in May 2024, this vulnerability could allow attackers to execute arbitrary code on a user’s device simply by visiting a malicious website. The vulnerability stems from a type confusion error

Generative AI: A New Weapon in the Cybercriminal Arsenal Read More »

Cyber Security Monthly Roundup – August 2024

Cyber Security Monthly Roundup – August 2024 August 2024 has been a particularly eventful month in cybersecurity, marked by critical infrastructure attacks, significant data breaches, and escalating cyber threats leveraging emerging technologies. Below is a roundup of the most impactful stories that shaped the cybersecurity landscape this month. Cyberattacks Targeting Critical Infrastructure in Australia Australia’s

Cyber Security Monthly Roundup – August 2024 Read More »

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime Fortifying financial security against cybercrime is increasingly critical for the financial sector. With nearly 20% of cyber incidents targeting financial institutions, resulting in direct losses of $12 billion, it’s evident that robust cybersecurity measures are essential. As our digital world expands, the threat landscape

Fortifying Financial Security: Addressing the Growing Threats and Costs of Cybercrime Read More »

Navigating Cybersecurity Risks Post-Microsoft-CrowdStrike Outage

Navigating Cyber Security Risks Post-Microsoft-CrowdStrike Outage In the aftermath of the recent worldwide tech outage caused by a faulty software update from cybersecurity firm CrowdStrike, small businesses find themselves at increased risk. Here are key points to consider: Be Sceptical of Unexpected Communications: Small business owners and employers should exercise caution when encountering unexpected emails,

Navigating Cybersecurity Risks Post-Microsoft-CrowdStrike Outage Read More »