Cybercrime Is A Real Economic Threat

If you've been caught up in an online scam you'd know what a headache they can cause and while businesses large and small are under threat, anyone with a presence online can be the victim of a cyber attack. Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs.

According to one of Australia's leading experts on cyber security, cybercrime is one of the most significant existential threats we'll face in our economy.

Alistair MacGibbon, national cyber security adviser and the head of the Australian Cyber Security Centre, thinks it is more important than ever that we knew how to keep ourselves safe online.

"If we get cyber security right as a community, we can get all the advantages of connected technologies," he said. "The millions of us online are the weakest link.

1. Change 'pass-phrase' often
If you think your one-word password with a number at the end makes the cut for online security, think again. 
"We all need a strong and hard-to-guess password," Mr MacGibbon said.
"Really we should call it a pass-phrase because it can be a series of words that you string together."
And if you're using the same password across multiple sites to keep it simple, you're likely making it easy for online criminals.
"It's important to have a different [password] for each of the services that you use," Mr MacGibbon said. "If you use the same password across multiple sites and it's compromised in one place, then it can also be used in others."

2. Update operating systems
With a multitude of programs installed across a range of devices used daily, it can seem as though there's constantly program updates required.  According to Mr MacGibbon, those program updates can be critical.

"Software manufacturers and hardware manufacturers have made it easy for us," he said. "We can just automate [updates] every time we login, which checks if we're running the latest operating system on our computer. "If not, let the system update itself."

3. Back up data
If you want to be one step ahead of hackers, Mr MacGibbon advises developing a system to back up data. 

"One of the fastest growing types of crime is a thing called ransomware," he said. "Unhelpful criminals will send us one of those links that's executable in an email. "We open it up and this malicious code or malware goes onto the computer and locks up files."
But if you've got your precious assets and material saved elsewhere, you've done yourself a favour. 

"If I've backed it up then I just tell the criminals that I'm not going to pay the ransom to unlock it and get my files going again," Mr MacGibbon said.

4. Identify dodgy and back away
As part of an initiative driven by the Australian Cyber Security Growth Network (AustCyber), school students across the country have been invited to participate in a new cyber defence challenge. The competition, called CyberTaipan, is designed to get students to go online and think like a hacker so they can better protect themselves from cyber-crime.

"Cyber security is going to be a component of every single job going forward," said network chief executive Michelle Price. "CyberTaipan is the Australian version of CyberPatriot, which has been running in the US now for 10 years. "We need the kids coming through to be on the front foot and have the awareness."

Ms Price said pinpointing when malicious software had been deployed on personal computers would depend on observing changes in the computer's behaviour.

"It might be running slower, it might take your mouse elsewhere on your screen when you weren't expecting it," "It might also just flick screens, and sometimes our computers do these things anyway and that's how hackers can get away with it."

What was important, Ms Price said, was to "have that care factor to think, is that malicious or not".

5. Report it
And if you've been the victim of cyber-crime or been sent something potentially problematic, reporting scams can help to limit broader harm.

ABC.net:

You Might Also Read:

Australia’s Cybersecurity Adviser Calls For Privacy:

Vulnerable Australia Boosts National Cyber Security:

 

« Weaponising Stolen Data
UK CEOs Believe Cyber Attacks Are Inevitable »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.