Making the
world a
safer place

Talking Cyber Security – The first step is always the hardest

As a business, our customers have high expectations of us, at times those high expectations feel unachievable but keeping the needs of our businesses and our customers in mind this enables you to plan ahead. Taking the necessary practical steps to enable your business to start managing your compliance expectations is easier and more cost […]

Unauthorised mobile porting, how could it possibly affect me?

Multi-factor authentication (“MFA”) is a technology which has seen widespread adoption across numerous platforms such as Facebook, Google and various Microsoft services.  It requires users to have two or more factors prior to access being granted to their account.  This is typically implemented through something known to the user, i.e. a password, and something they […]

Talking Cyber Security – If you can’t measure it, you can’t manage it.

The first step in any effective cyber security framework it taking ownership of the framework, this can begin with a company board, collective business groups, teams or even an individual, but without that committed undertaking of responsibility and the shared awareness of its applicability and awareness throughout your organisation how can the plan thrive? Effective […]

Talking Cyber Security – Asking the right questions

We don’t need to look very far to learn that security management is a pretty big deal, if your organisation is in the position where you know you need to make changes, starting by understanding  at what stage is your organisation and clarifying what your organisations security posture is? Do you know how to do all […]

Talking Cyber Security – Cyber pragmatism the impact and consequences.

Threats from modern cyber attacks are becoming bigger than any IT department or Help desk in any organisation around the globe. The internalisation of the management and accountability of a security incident is becoming an unattainable business function. The market is seeing a growing need to externalise the cost of an incident. With businesses better […]

Meltdown and Spectre

What’s the risk? Meltdown and Spectre are two vulnerabilities which have been gaining substantial media attention over recent months.  These vulnerabilities reside in the hardware of modern CPUs. These hardware vulnerabilities allow programs and applications to steal data currently being processed on the computer including that of privileged applications.  This data may include system passwords, […]

CQR Security Bulletin – Cisco ASA WebVPN Bug, Understanding The Risks And How To Reduce It

What’s the risk? An unauthenticated Remote Code Execution/Denial of Service vulnerability has been identified as affecting the WebVPN component of various Cisco ASA services.  This vulnerability presents a significant risk to an organisation’s Confidentiality, Integrity and Availability as it may allow an external attacker to remotely compromise an organisation’s VPN gateway. How might you be […]

Talking Cyber Security: Protection is more than just a solution

In this instalment of ‘Talking Cyber Security’ Phil Kernick and David Simpson discuss how organisations should be looking at their business and what considerations they should be making, including looking at their past, present and future Cyber Security strategy in-line with their business. With no regulations set around software, it’s development, function, use and it’s […]

Advice for avoiding an Uber style breach

Uber have recently released details of a large-scale data breach identified to have occurred in October 2016.  As with all companies of this size, Uber was legally required to report the hack to regulators and users affected by the breach.  However, the decision was made to pay off the hackers (~$132,000 AUD) for the deletion […]

We use cookies on this site to provide you with a better user experience. Read More