We can help with SG Cyber Safe Certification

Blog

Hashing Algorithms for storing Passwords

Almost every week, an ever-growing list of data breaches occur around the world. In a lot of cases, attackers ultimately gain access to sensitive information such as a hashed password database. This type of information can be useful for the bad guys when targeting specific organisations and/or people.

A future ISM prospect?

Department of Homeland security has issued an emergency directive requiring all US agencies to operate with a .gov domain. AU Gov tends to follow US Gov directives in turn so potentially, this is something that may be incorporated into the ISM in future.

3-2-1 Backup Strategy

Daily Backups are bread and butter of any organisation’s IT department. An organisation can lose its data due to many reasons: cyber-attacks, corrupt storage media, rogue employees or human error. Yet many companies fail to formulate a backup and recovery plan for their data.

Vulnerabilities in Fax Protocol

ATO claims to have received more than 115,000 faxed documents in 2017-18. According to ‘The Age’, and ‘the Sydney Morning Herald ‘, many small Australian companies in the healthcare, finance and legal sector still use fax on a daily basis. The vulnerabilities in the fax machine protocols haven’t been updated since the 1980s and such extensive use of fax printers in Australia pose a huge problem.

Adobe’s Security Updates

Adobe has recently released security updates to fix two critical vulnerabilities for Acrobat and Reader. The first vulnerability, identified as CVE-2018-16011, can lead to the execution of arbitrary code. The second vulnerability, identified as CVE-2018-19725, can result in privilege escalation.

Consumer Security Behaviors

Apart from having financial implications, a security breach leads to a loss of consumer trust. An illustration of this is in the hospitality industry, where breaches can have a negative impact on consumer perception, satisfaction and intent to revisit (Berezina et al., 2012).

Marriot Data Breach and What Should the Customers do to Protect Themselves

Marriot on Friday reported a data breach affecting the information of 500 million of its Starwood customers. The stolen information includes name, phone number, email addresses, passport number and in some cases credit card numbers and expiry dates. While the company is still taking measures to do damage control for the second-biggest breach in history (after Yahoo’s data breach), here is what consumers can do to protect themselves:

Scroll to Top