Did You Know That Reusing Passwords Increases Your Risk Of A Breach?

What is Password Reuse? Password reuse is a person’s tendency to use the same password across different online services. Password reuse is a problem where people try to remember multiple passwords for everything they interact with regularly, using the same password on multiple systems, tiers of applications, and social media sites. The Risks Once one […]
Did You Know There Are Password Strategies To Improve Security?

Using current computing power, most passwords less than eight characters long can be brute-forced in less than a day. This includes passwords using upper, lower case and special characters. In the next series of posts, we will cover how to create your own password management strategy. The posts aim to help you formulate a better […]
Did You Know There are Cyber Insurance Policies for Businesses?

Do I Need Cyber Insurance For My Business? A cyber insurance policy can be a valuable risk transfer tool for business. Cyber insurance is a type of specialty insurance that protects organisations against various risks related to cyber security attacks, such as ransomware and data breaches. It can help protect your business and minimise any […]
Did You Know There Are Risks With Insecure Wi-Fi In Your Pharmacy?

Business wi-fi network make it an essential service for most organisations. Unfortunately, many businesses lack the necessary resources and cyber skills to secure their network correctly. This can create security risks because an unsecured network leaves the company vulnerable to attacks from threat actors who will use an unsecured wi-fi point to gain access to […]
Did You Know A Threat Actor Can Port Your Phone Number To Their Device?

Socially Engineered Security Risks Series What is SIM swapping? A SIM swapping attack occurs when a threat actor convinces a target’s mobile phone carrier to port the target’s mobile phone number to a device the threat actor owns. Once this occurs, they can receive phone calls and text messages intended for the target. The threat […]
Did You Know That October Is Cyber Security Awareness Month, An Annual Reminder For All Australians To Stay Secure Online?

Cyber Security Awareness Month As you know, this month, we have focused on social media and online privacy, but it has also been a month of cyber breaches. Optus kicked things off, and we already have threat actors targeting those affected. Then we had Medibank with ransomware, a subsidiary of Woolworths called Mydeal losing 2.2 […]
Did You Know That You Can Check If Your Personal Information Has Been Breached?

Socially Engineered Security Risks Series While the media has moved on to other news, the Optus Breach and its investigation are still ongoing. We still don’t have clear details on what occurred and exactly what was taken. Perhaps this has you wondering if your information may have been breached previously and you were not informed. […]
Did You Know That Reviewing Security and Privacy Settings is Crucial When Installing and Signing Up For New Mobile Apps?

Socially Engineered Security Risks Series We take the apps we run on our mobile phones and tablets for granted. We log in, share photos, add personal information, and allow the apps to track our locations. But have you ever taken the time to review the types of data you share with those apps and what […]
Did You Know That You Can Enhance Your Social Media Privacy and Security?

Socially Engineered Security Risks Series Social Media Fraudsters Social media has become one of the most common methods for committing cyber fraud. There are several ways in which threat actors use social media to gain access to your information, your account, or your money. They may create fake profiles, such as using the same name […]
Corum Cyber Alert: Optus Breach

What Can You Do About Your Personal Security If You Are Impacted By The Optus Breach? My role in Corum involves providing security guidance and advice to our internal team about product or system security. It also means I get approached by our staff when there are incidents, such as with the Optus Breach. Speaking […]