Posted in Cyber Security
Secure your I.T. systems over Christmas
Posted by Deb Cashion
on 14 December 2022
)
Before you go on vacation you generally check that the power points are turned off, someone is going to collect the mail and that all the doors are securely locked. But what about your I.T. security? Cyber criminals do not take holidays - in fact cyber-attacks and hacks increase during the holiday and sale season.
This blog is a reminder of a to-do list of actions to ensure you have done, I.T. wise, before going on vacation.
Enable multi-factor authenticati...
This blog is a reminder of a to-do list of actions to ensure you have done, I.T. wise, before going on vacation.
Enable multi-factor authenticati...
Posted in:SecurityNetworking SecurityCyber Security |
Multi Factor Authentication is more important than ever!
Posted by Deb Cashion
on 27 October 2022
)
In these scary times of hackers targeting all individuals and businesses, it is more important than ever to up the ante in the security department and do all you can to keep yourself safe from a cyber-attack. With the recent announcement of possible changes in legislation, businesses could face astronomical fines for not providing relevant protection for their clients and clients' data.
An integral part of The Essential 8 is to introduce multiple layers of protection, such...
Posted in:Networking SecurityCyber Security |
Five new ways scammers are targeting you
Posted by Deb Cashion
on 12 October 2022
)
October is Cyber Security month and with this we wanted to share some of the new and different ways hackers and scammers are finding to target and attack vulnerable technology users.
Although we are always here to help in the event of a potential hack or scam, below are five new ways hackers and scammers are targeting you.
1. The Spoofed Email/Text
Spoofing is when a hacker or scammer impersonates you and sends an email or text to people who you do business with or kn...
Posted in:SecurityNewsNetworking SecurityCyber Security |
Can you recover from a Scam or Hack?
Posted by Deb Cashion
on 19 July 2022
)
Scams have been in the media lately, with blogger Constance Hall being the victim of a scam after she sent money to a real estate agent to secure a rental property only to later find out a hacker was posing as the realtor.
In this, and other cases, you might want to know if you can recover lost money after you have been hacked or scammed. This blog aims to give you some insight into what can be done after the event of a hack or scam.
Our last blog gave you hints and tips on how t...
Posted in:SecurityCyber Security |
How to be safe in a cyber world
Posted by Deb Cashion
on 23 June 2022
)
Scamwatch – the Australian government website for consumer awareness – has shown a trend of increasing cyber-attacks in Australia. For example, so far in 2022, over 70,000 scams have been reported and over 205 million dollars have been lost to businesses and consumers in cyber-attacks of one sort or another. This number rises even greater when you consider that there are some attacks not reported. This statistic is a shocking increase of 314 per cent compared to the...
Posted in:SecurityCyber Security |
Cyber Security Assessments
Posted by Kaylene Giff
on 26 May 2022
)
A Cyber Security Assessment is designed to assist in ensuring your business is protected by researching and reporting on your security needs.
Loyal I.T Solutions can help with in the way of cyber security, as we assess your businesses security against the Essential 8 framework.
The 8 essential points are under 3 distinct defensive lines:
Mitigation Strategies to Prevent Malware Delivery and Execution
Application control;
Configure Microsoft Office macro settings;&...
Posted in:Cyber Security |