Latest News

Apart from having financial implications, a security breach leads to a loss of consumer trust. An illustration of this is in the hospitality industry, where breaches can have a negative impact on consumer perception, satisfaction and intent to revisit (Berezina et al., 2012).

In their study ‘Consumer security behaviours and trust following a data breach’, authors Shelby R. Curtis, Jessica Rose Carre and Daniel Nelson Jones concluded that, following a data breach consumers perceived companies as less trustworthy, but did not change their ‘behavioural intentions to be personally more secure’.   This suggests that companies should be omitting reliance on improved user security practices when assessing their security posture following a security breach.

Our team of experienced security consultants can assess your current security posture with a Cyber Resilience Health Check. Give us a call at 1800 996 001, and discover how we can help.

casual computers hands 1181210

One of the most overlooked ACSC Essential Eight strategies in mitigating cyber security incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed.

Daily backups should still be the bread and butter of any IT department, we’ve all been doing it for years. However, how confident are you in your organisation’s process? Are you backing up all of your company’s important data, software and configurations daily? Are the backups securely stored? When was a full recovery of backup data last tested? How quickly could your organisation recover from a ransomware attack? Sometimes it’s worth checking to ensure the basics are operating as expected.

Author: David Roccasalva

The importance of Information and Technology Governance cannot be overstated. With companies trying to maximise the value derived from IT assets while managing the associated risks, the need for a structured approach to designing and implementing enterprise governance for IT is key.

ISACA's COBIT has been one of the most accepted frameworks in this area for over 20 years. Recently ISACA has released COBIT® 2019, its first update to the COBIT framework in nearly seven years. The new version provides comprehensive practical guidance and new focus areas in hot topics like DevOps, Cyber Security and Digital Transformation. COBIT® 2019 has been written in a way that can now easily be customised for small-to-medium sized business.

Author: Pablo Borges

US based hardware giants Dell recently announced a security breach that took place earlier in the month of November.

Even though Dell forced its customers to reset their passwords, users should still be concerned. If hackers are able to steal passwords from one website then they can possibly use that information to access some other websites too. It is recommended you reset any passwords for other websites where the same password was used on and Use strong and unique passwords and promote the use of a password manager.

Check out the following link to learn more about good password practices.

dell hacks

Dropbox has recently revealed three critical vulnerabilities in the Apple MacOS operating system, which could allow a hacker to execute a malicious code by convincing the victim to visit the malicious web page.

The video demonstration shows that researchers have been able to create a two-stage attack on a Mac computer just by convincing the victim to follow the malicious page. Apple continuously releases updates to fix new vulnerabilities. Users should continuously install monthly updates in order to protect their systems against such threats.

Source: The Hacker News