Latest News

ATO claims to have received more than 115,000 faxed documents in 2017-18. According to ‘The Age’, and ‘the Sydney Morning Herald ‘, many small Australian companies in the healthcare, finance and legal sector still use fax on a daily basis. The vulnerabilities in the fax machine protocols haven’t been updated since the 1980s and such extensive use of fax printers in Australia pose a huge problem.

At the recent DEF CON 26 hacker event in Las Vegas, two security researchers from Check Point demonstrated one such exploit - ‘Faxploit’. They showed that a hacker only needs a fax number to exploit these vulnerabilities. A specially coded colour jpeg can have any malware code, which when received by the fax printer, can easily be decoded and uploaded into the printer’s memory. The malware can then spread through the device and ultimately to the network that is connected to the fax-printer. 

One way to prevent Faxploit is via network segmentation. Companies can limit the data access to an attacker by breaking large networks into smaller ones, or by isolating fax machines in their own subnetworks.


Privasec's Cyber Security Advisor for APAC, Shamane Tan wrote an article about the Open Group FAIR framework. This framework provides a structured and community vetted approach to calculate the Return on Investment (ROI) on cybersecurity controls. Read the full article here.


Distributed Denial-of-Service (DDoS) attack is an attempt to disrupt the normal functioning of a network, server or a website by flooding it with internet traffic. During a DDoS attack, there is practically no time to react.

Therefore, it is crucial to have a plan before a DDoS attack strikes. The plan must properly document the network topology diagram for management of crucial assets during the attack and require the alerting of relevant stakeholders. A few other tricks for preparing for a DDoS attack include the use of sufficient bandwidth, infrastructure redundancy, DNS server redundancy and use of WAF (web application firewalls) for server protection.

Apart from having financial implications, a security breach leads to a loss of consumer trust. An illustration of this is in the hospitality industry, where breaches can have a negative impact on consumer perception, satisfaction and intent to revisit (Berezina et al., 2012).

In their study ‘Consumer security behaviours and trust following a data breach’, authors Shelby R. Curtis, Jessica Rose Carre and Daniel Nelson Jones concluded that, following a data breach consumers perceived companies as less trustworthy, but did not change their ‘behavioural intentions to be personally more secure’.   This suggests that companies should be omitting reliance on improved user security practices when assessing their security posture following a security breach.

Our team of experienced security consultants can assess your current security posture with a Cyber Resilience Health Check. Give us a call at 1800 996 001, and discover how we can help.

casual computers hands 1181210

One of the most overlooked ACSC Essential Eight strategies in mitigating cyber security incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed.

Daily backups should still be the bread and butter of any IT department, we’ve all been doing it for years. However, how confident are you in your organisation’s process? Are you backing up all of your company’s important data, software and configurations daily? Are the backups securely stored? When was a full recovery of backup data last tested? How quickly could your organisation recover from a ransomware attack? Sometimes it’s worth checking to ensure the basics are operating as expected.

Author: David Roccasalva