Cyber Attacks

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack The recent cyberattack targeting Quantum Radiology, a prominent Australian medical imaging provider, serves as a stark reminder of the growing cyber threat landscape. While the healthcare sector is often a prime target for malicious actors due to the sensitive nature of patient data, the lessons learned from […]

SME Cybersecurity Alert: Learning from Quantum Radiology’s Attack Read More »

Why Your Business Needs Continuous Vulnerability Management

Why Your Business Needs Continuous Vulnerability Management In today’s threat landscape, attackers are constantly innovating and exploiting new vulnerabilities as soon as they emerge. Traditional, point-in-time vulnerability scans leave a dangerous gap in your defences. That’s where Continuous Vulnerability Management (CVM) comes in. Here’s why CVM is a critical addition to your security posture: Real-time

Why Your Business Needs Continuous Vulnerability Management Read More »

What Is Endpoint Detection and Response (EDR)

What Is Endpoint Detection and Response (EDR) Introducing EDR and answering your most pressing questions, this guide dives into Endpoint Detection and Response, a modern approach to endpoint security. EDR goes beyond traditional antivirus by proactively detecting suspicious behaviour and responding before harm is done. Read more for an in-depth look at EDR and MDR

What Is Endpoint Detection and Response (EDR) Read More »

HubSpot investigating customer account hacks

HubSpot Investigating Customer Account Hacks Software firm HubSpot is investigating a cyber security incident that targeted its customers. “On June 22, we identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorised access to their accounts,” a HubSpot spokesperson told Reuters in an emailed statement. HubSpot is

HubSpot investigating customer account hacks Read More »

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon?

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Protecting Your Customers From SMS Scams. Scammers are increasingly targeting unsuspecting individuals through text messages, often impersonating legitimate companies like banks or telcos. These scams can result in significant financial losses and reputational damage for your business. The

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Read More »

security, professional, secret-5199236.jpg

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks This month’s newsletter brings a stark reminder of the ever-present threat of cybercrime, even for large organisations with robust IT infrastructure. A recent Victorian government audit revealed hackers infiltrated a central database and altered supplier bank details on four separate occasions over a year

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks Read More »

Optus Must Reveal Parts of Data Breach Report in Lawsuit

Optus Must Reveal Parts of Data Breach Report in Lawsuit Optus attempt to keep a Deloitte report on their 2022 data breach hidden has failed. A Federal Court decision allows law firm Slater and Gordon, representing over 10,000 affected customers, access to portions of the report for their class action lawsuit. This ruling means the

Optus Must Reveal Parts of Data Breach Report in Lawsuit Read More »

From Vulnerable to Vigilant: Security Customer Case Study

From Vulnerable to Vigilant: Australin IT Services Management Firm Fortified its Security Posture The Client A leading Australian IT service management firm with a global presence felt increasingly exposed in today’s ever-evolving cyber threat landscape. With a large employee base and vast amounts of client data entrusted to them – a robust security posture was

From Vulnerable to Vigilant: Security Customer Case Study Read More »

Cybersecurity Budgets, Benchmarks for Financial Services

Cybersecurity Budgets and Benchmarks for Financial Institutions While cybersecurity budgets at financial services institutions are constrained compared with previous years, fundamental concerns still dominate priorities, according to a recent survey report. Digital transformation is the top business driver for cybersecurity, but respondents indicate that regulatory pressure is increasing and gaining in importance. Further, it seems cybersecurity

Cybersecurity Budgets, Benchmarks for Financial Services Read More »

hands, shaking hands, company-1063442.jpg