Introductory Considerations to Cyber Resiliency

…practically every industry vertical as cyber attackers are getting bolder and more sophisticated. The size of the cyber-crime industry is truly breathtaking and only continues to grow. Cybersecurity Ventures expects…

Continue Reading →

When do I invoke Cyber Recovery?

…failure. Usually in these situations security is still OK, and your staff aren’t compromised1. Cyber Recovery And then there’s a cyber recovery situation. What are the likely drivers of this?…

Continue Reading →

Cyber Vaults need Robust Recovery Processes and Documentation

…Vaults? Quite a lot. So why do Cyber Vaults need Recovery Processes? Recovery from a Cyberattack is not a normal process. I’ll use some Australian vernacular here: the sh*t has…

Continue Reading →

Data Protection in 2020: Reflections

…this “humanitarian” approach has been abandoned. Cold-call threats – There have been instances recently where cyber-attackers have cold-called victims if their software has detected evidence of restores being performed. This takes…

Continue Reading →

A Few Considerations Around Data Breaches in Australia

…comparison, malicious/criminal breaches are reported based on: Cyber incident Rogue employee/insider threat Social engineering/impersonation Stolen paperwork/data storage devices Cyber incidents are subsequently broken down into: Brute force attacks Hacking Ransomware…

Continue Reading →