Be cyber aware this holiday season

Posted by Michael Trimblett and Deb Cashion on 9 December 2021
Be cyber aware this holiday season
Australians are set to spend over $11 billion on Christmas presents this year, with a significant proportion to come from online sales - toys, jigsaw puzzles and board games are set to top the list of most popular gifts, according to research from the Australian Retailers Association (ARA). Buying online means that Australians are turning to the internet in a big way - an average of 48% of Christmas presents are likely to be purchased online, with 58% of people saying they’ll purchase m...
Posted in:SecurityCyber Security  

To update or not update - that is the question

Posted by Michael Trimblett and Deb Cashion on 26 November 2021
To update or not update - that is the question
Everyone knows that updates are important, and to update frequently, but WHY should we do it? The Australian Cyber Security Centre recommends that users “patch your operating systems and applications within 48 hours where an exploit exists” and, as we know, cyber crime is a growing concern and almost everyone can be exploited. To illustrate this, the Annual Cyber Threat Report for FY 2020-21 has been released and shows an increase of nearly 13% in cyber crimes from 2019-...
Posted in:Computer MaintenanceWindows Update  

Identity Theft – A Growing Concern

Posted by Deb Cashion on 25 October 2021
Identity Theft – A Growing Concern
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. By October 2021, Scamwatch (scamwatch.gov.au) had already received 18,012 reports relating to identity theft this year alone. Scammers will try and access your identity to perform one or more of the following: Access and drain personal or business bank accounts; Open new bank accounts in your name and take out loans or lines of credit; Take out phone plans and other c...
Posted in:SecurityCyber Security  

What is Ethical Hacking?

Posted by Michael Trimblett and Deb Cashion on 15 October 2021
What is Ethical Hacking?
Hacking, usually, is defined as an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.  Hackers can destroy, steal or even prevent authorised users from accessing the system. Ethical hacking involves an authorised attempt to gain unauthorised access to a computer system, application, or data. Carrying out an ethical hack involves duplic...
Posted in:Cyber Security  

Modus Operandi of Cyber Attacks

Posted by Michael Trimblett on 8 October 2021
Modus Operandi of Cyber Attacks
The internet is ubiquitous. It has quickly become an essential utility like electricity and water. However, when the internet was built, it was designed with functionality in mind, not security. Definitions Cybercrime the term used to describe crimes directed at computers or other information communications technologies and crimes where computers or ICTs are an integral part of an offence. Cyber security is the practice of defending computers, networks, servers, mobile devices, data f...
Posted in:SecurityCyber Security  

International Cyber Security Awareness Month a.k.a. “Hacktober”

Posted by Deb Cashion on 1 October 2021
International Cyber Security Awareness Month a.k.a. “Hacktober”
Welcome to International Cyber Security Awareness month, known as Hacktober. It’s a lesser-known fact that small and medium business are being targeted more and more by cybercriminals and there is a valid reason for this; Hackers tend to focus on easy and vulnerable targets-it’s a random selection based on the Hackers search on the internet for vulnerable devices, easy access or it can be a case of less savvy staff being ‘socially engineered’ to allow hacker’s a...
Posted in:SecurityNetworking SecurityCyber Security  

Log a Job
Or an Enquiry

help@loyalit.com.au

Loyal IT
Latest news

21 November 2024
Bringing Mental Health to the Table – Our Big Blue Table Event Last Friday Loyal I.T. proudly hosted a Big Blue Tab...
Read All Latest News

Our Clients
say

Thank you for helping me navigate our security requirements, sending through the proposal so quickly and organising a support ticket. Great customer service!

Penny Newson
Read All Testimonials

Resources Helpful
fact sheets

Download Our Fact Sheets

Sign Up for Newsletter