Insider Threats: when the call is coming from inside the house
It’s common knowledge that organisations of all sizes face numerous and formidable cyber-threat actors, and we certainly seem to hear plenty about them: Cyber-criminals or nation-state actors that are bankrolled by foreign governments. However, we focus on these threats at the expense of others to our peril. With that in mind, let’s talk about insider threats.
The Ransomware crisis: It’s Time to Retake Control
The discussion so far has dovetailed into an argument for how techno-centric and HCCS can (and do) work together to resist and repel cybercrime, and although it is great to have a strategy for what we need to do, we need to remain cognisant of the sobering reality of our predicament: The ransomware crisis is far beyond the scope and capabilities of any single company or organisation.
Techno-Centric Cybersecurity and HCCS: Can’t we all just be friends?
In my last article, I made the argument that Human Centric Cybersecurity (HCCS) and conventional technical elements of cybersecurity need to work together as a unified front when combating ransomware. So, how does that work in practice when applied to combating ransomware?
Social Engineering: when people are the problem, they’re also the solution
When we hear about companies suffering from ransomware attacks, we often think about the impact on the business, and sometimes even the consequences for society. However, in the midst of all the lamenting and impotent rage we often fail to think about how and why the attacks happened in the first place.
Australia’s Ransomware Crisis
Cybercrime has long been the stuff of the Internet’s collective cultural imagination; a well-worn stereotype of the hooded figure hunched over a keyboard. It might sound dramatic but make no mistake; ransomware attacks have grown in scale and frequency to a point where they now threaten the safety and wellbeing of all Australians.
Untangling Open Banking: how the CDR works (and how it could work better)
Open banking is no longer something ‘out there’ in the future. It’s here. And it’s set to shake things up. Right now, with little to no uptake and limited industry activity, the CDR implementation model isn't being stress-tested. We believe there are better ways to implement CDR that could hold the key to resolving many issues.
The Egg Story: the delicate connection between you & your security technology
Your organisation’s sensitive information is like the inside of an egg. To ensure their security against cyber attacks, most organisations today add layers of protection, constantly updating and investing in different methods to improve the protective properties of their ‘eggshell’. do you know how safe your egg is?
Exploring Smart Communities and Smart Business in 2021
As we approach 2021, our thoughts turn to creating more interconnected cities and spaces - spaces where liveability, workability and sustainability are enhanced using streams of data. Specifically, we want businesses, government, and councils to consider smarter, more technologically planned spaces.
Find the best vendor for your business in the tender pile
Finding the best vendor for your organisation’s needs is not as easy as it seems. They’re all competitively priced, offer great, but different expertise, and seem to offer only the ‘best’. But how do you know which one will deliver over and above what you want?