Cybercrime Is A Real Economic Threat

If you've been caught up in an online scam you'd know what a headache they can cause and while businesses large and small are under threat, anyone with a presence online can be the victim of a cyber attack. Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs.

According to one of Australia's leading experts on cyber security, cybercrime is one of the most significant existential threats we'll face in our economy.

Alistair MacGibbon, national cyber security adviser and the head of the Australian Cyber Security Centre, thinks it is more important than ever that we knew how to keep ourselves safe online.

"If we get cyber security right as a community, we can get all the advantages of connected technologies," he said. "The millions of us online are the weakest link.

1. Change 'pass-phrase' often
If you think your one-word password with a number at the end makes the cut for online security, think again. 
"We all need a strong and hard-to-guess password," Mr MacGibbon said.
"Really we should call it a pass-phrase because it can be a series of words that you string together."
And if you're using the same password across multiple sites to keep it simple, you're likely making it easy for online criminals.
"It's important to have a different [password] for each of the services that you use," Mr MacGibbon said. "If you use the same password across multiple sites and it's compromised in one place, then it can also be used in others."

2. Update operating systems
With a multitude of programs installed across a range of devices used daily, it can seem as though there's constantly program updates required.  According to Mr MacGibbon, those program updates can be critical.

"Software manufacturers and hardware manufacturers have made it easy for us," he said. "We can just automate [updates] every time we login, which checks if we're running the latest operating system on our computer. "If not, let the system update itself."

3. Back up data
If you want to be one step ahead of hackers, Mr MacGibbon advises developing a system to back up data. 

"One of the fastest growing types of crime is a thing called ransomware," he said. "Unhelpful criminals will send us one of those links that's executable in an email. "We open it up and this malicious code or malware goes onto the computer and locks up files."
But if you've got your precious assets and material saved elsewhere, you've done yourself a favour. 

"If I've backed it up then I just tell the criminals that I'm not going to pay the ransom to unlock it and get my files going again," Mr MacGibbon said.

4. Identify dodgy and back away
As part of an initiative driven by the Australian Cyber Security Growth Network (AustCyber), school students across the country have been invited to participate in a new cyber defence challenge. The competition, called CyberTaipan, is designed to get students to go online and think like a hacker so they can better protect themselves from cyber-crime.

"Cyber security is going to be a component of every single job going forward," said network chief executive Michelle Price. "CyberTaipan is the Australian version of CyberPatriot, which has been running in the US now for 10 years. "We need the kids coming through to be on the front foot and have the awareness."

Ms Price said pinpointing when malicious software had been deployed on personal computers would depend on observing changes in the computer's behaviour.

"It might be running slower, it might take your mouse elsewhere on your screen when you weren't expecting it," "It might also just flick screens, and sometimes our computers do these things anyway and that's how hackers can get away with it."

What was important, Ms Price said, was to "have that care factor to think, is that malicious or not".

5. Report it
And if you've been the victim of cyber-crime or been sent something potentially problematic, reporting scams can help to limit broader harm.

ABC.net:

You Might Also Read:

Australia’s Cybersecurity Adviser Calls For Privacy:

Vulnerable Australia Boosts National Cyber Security:

 

« Weaponising Stolen Data
UK CEOs Believe Cyber Attacks Are Inevitable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

COGITANDA Dataprotect

COGITANDA Dataprotect

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them.