Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on Businesses

Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on SMEs A significant development is shaking up the Australian cybersecurity landscape: the proposed anti-scam law targeting large internet companies. While aimed at Big Tech, the implications of this legislation extend to all businesses in the digital space, especially Small and Medium Enterprises (SMEs). […]

Big Tech on Notice: Australia’s New Anti-Scam Law and Its Impact on Businesses Read More »

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack The recent cyberattack targeting Quantum Radiology, a prominent Australian medical imaging provider, serves as a stark reminder of the growing cyber threat landscape. While the healthcare sector is often a prime target for malicious actors due to the sensitive nature of patient data, the lessons learned from

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack Read More »

Why Your Business Needs Continuous Vulnerability Management

Why Your Business Needs Continuous Vulnerability Management In today’s threat landscape, attackers are constantly innovating and exploiting new vulnerabilities as soon as they emerge. Traditional, point-in-time vulnerability scans leave a dangerous gap in your defences. That’s where Continuous Vulnerability Management (CVM) comes in. Here’s why CVM is a critical addition to your security posture: Real-time

Why Your Business Needs Continuous Vulnerability Management Read More »

What Is Endpoint Detection and Response (EDR)

What Is Endpoint Detection and Response (EDR) Introducing EDR and answering your most pressing questions, this guide dives into Endpoint Detection and Response, a modern approach to endpoint security. EDR goes beyond traditional antivirus by proactively detecting suspicious behaviour and responding before harm is done. Read more for an in-depth look at EDR and MDR

What Is Endpoint Detection and Response (EDR) Read More »

HubSpot investigating customer account hacks

HubSpot Investigating Customer Account Hacks Software firm HubSpot is investigating a cyber security incident that targeted its customers. “On June 22, we identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorised access to their accounts,” a HubSpot spokesperson told Reuters in an emailed statement. HubSpot is

HubSpot investigating customer account hacks Read More »

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon?

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Protecting Your Customers From SMS Scams. Scammers are increasingly targeting unsuspecting individuals through text messages, often impersonating legitimate companies like banks or telcos. These scams can result in significant financial losses and reputational damage for your business. The

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Read More »

security, professional, secret-5199236.jpg

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks This month’s newsletter brings a stark reminder of the ever-present threat of cybercrime, even for large organisations with robust IT infrastructure. A recent Victorian government audit revealed hackers infiltrated a central database and altered supplier bank details on four separate occasions over a year

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks Read More »

Optus Must Reveal Parts of Data Breach Report in Lawsuit

Optus Must Reveal Parts of Data Breach Report in Lawsuit Optus attempt to keep a Deloitte report on their 2022 data breach hidden has failed. A Federal Court decision allows law firm Slater and Gordon, representing over 10,000 affected customers, access to portions of the report for their class action lawsuit. This ruling means the

Optus Must Reveal Parts of Data Breach Report in Lawsuit Read More »

The Three-Pronged Approach to Conquering Cyber Security

The Three-Pronged Approach to Conquering Cyber Security Cyber threats are constantly evolving, making it a challenge to keep your organisation’s data and systems secure. While some might think the answer lies solely in the latest tech, the most successful approach utilises a three-pillar approach to cybersecurity: People, Processes, and Technology. People: Your Human Firewall People

The Three-Pronged Approach to Conquering Cyber Security Read More »