Posted in Cyber Security
Web filtering and ‘Defence in Depth’
Posted by Deb Cashion
on 17 February 2022
What is it?
Web or Domain Name System (DNS) filtering is the process of using the DNS to block malicious websites or filter out harmful or inappropriate content.
Web filtering is a line of security within an organisation. Using a similar system to the military strategy of ‘Defence in Depth’, multiple layers of controls are used to ensure security. Web filtering is a complimentary measure to other cyber security controls in a ‘Defence in Depth’ strategy. ...
Posted in:Networking SecurityCyber Security |
Signs you are being a victim of cybercrime
Posted by Deb Cashion
on 19 January 2022
Signs of hacking
Modern society is electronic – a place where our banking, social life, mail, shopping and work is in cyber space. This comes with many dangers, the most alarming being hacking. The good news is that Loyal I.T. Solutions has an application called Perch, that tracks and monitors activities, known as Security Event and Incident Management (SEIM). To see Perch in action and the versatility of the SEIM, check out the Cyber Security Business Connect and Protect video.&...
Posted in:SecurityNetworking SecurityCyber Security |
Be cyber aware this holiday season
Posted by Michael Trimblett and Deb Cashion
on 9 December 2021
Australians are set to spend over $11 billion on Christmas presents this year, with a significant proportion to come from online sales - toys, jigsaw puzzles and board games are set to top the list of most popular gifts, according to research from the Australian Retailers Association (ARA). Buying online means that Australians are turning to the internet in a big way - an average of 48% of Christmas presents are likely to be purchased online, with 58% of people saying they’ll purchase m...
Posted in:SecurityCyber Security |
Identity Theft – A Growing Concern
Posted by Deb Cashion
on 25 October 2021
Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. By October 2021, Scamwatch (scamwatch.gov.au) had already received 18,012 reports relating to identity theft this year alone.
Scammers will try and access your identity to perform one or more of the following:
Access and drain personal or business bank accounts;
Open new bank accounts in your name and take out loans or lines of credit;
Take out phone plans and other c...
Posted in:SecurityCyber Security |
What is Ethical Hacking?
Posted by Michael Trimblett and Deb Cashion
on 15 October 2021
Hacking, usually, is defined as an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose. Hackers can destroy, steal or even prevent authorised users from accessing the system.
Ethical hacking involves an authorised attempt to gain unauthorised access to a computer system, application, or data. Carrying out an ethical hack involves duplic...
Posted in:Cyber Security |
Modus Operandi of Cyber Attacks
Posted by Michael Trimblett
on 8 October 2021
The internet is ubiquitous. It has quickly become an essential utility like electricity and water. However, when the internet was built, it was designed with functionality in mind, not security.
Definitions
Cybercrime the term used to describe crimes directed at computers or other information communications technologies and crimes where computers or ICTs are an integral part of an offence.
Cyber security is the practice of defending computers, networks, servers, mobile devices, data f...
Posted in:SecurityCyber Security |