Cybercrime Is A Real Economic Threat

If you've been caught up in an online scam you'd know what a headache they can cause and while businesses large and small are under threat, anyone with a presence online can be the victim of a cyber attack. Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs.

According to one of Australia's leading experts on cyber security, cybercrime is one of the most significant existential threats we'll face in our economy.

Alistair MacGibbon, national cyber security adviser and the head of the Australian Cyber Security Centre, thinks it is more important than ever that we knew how to keep ourselves safe online.

"If we get cyber security right as a community, we can get all the advantages of connected technologies," he said. "The millions of us online are the weakest link.

1. Change 'pass-phrase' often
If you think your one-word password with a number at the end makes the cut for online security, think again. 
"We all need a strong and hard-to-guess password," Mr MacGibbon said.
"Really we should call it a pass-phrase because it can be a series of words that you string together."
And if you're using the same password across multiple sites to keep it simple, you're likely making it easy for online criminals.
"It's important to have a different [password] for each of the services that you use," Mr MacGibbon said. "If you use the same password across multiple sites and it's compromised in one place, then it can also be used in others."

2. Update operating systems
With a multitude of programs installed across a range of devices used daily, it can seem as though there's constantly program updates required.  According to Mr MacGibbon, those program updates can be critical.

"Software manufacturers and hardware manufacturers have made it easy for us," he said. "We can just automate [updates] every time we login, which checks if we're running the latest operating system on our computer. "If not, let the system update itself."

3. Back up data
If you want to be one step ahead of hackers, Mr MacGibbon advises developing a system to back up data. 

"One of the fastest growing types of crime is a thing called ransomware," he said. "Unhelpful criminals will send us one of those links that's executable in an email. "We open it up and this malicious code or malware goes onto the computer and locks up files."
But if you've got your precious assets and material saved elsewhere, you've done yourself a favour. 

"If I've backed it up then I just tell the criminals that I'm not going to pay the ransom to unlock it and get my files going again," Mr MacGibbon said.

4. Identify dodgy and back away
As part of an initiative driven by the Australian Cyber Security Growth Network (AustCyber), school students across the country have been invited to participate in a new cyber defence challenge. The competition, called CyberTaipan, is designed to get students to go online and think like a hacker so they can better protect themselves from cyber-crime.

"Cyber security is going to be a component of every single job going forward," said network chief executive Michelle Price. "CyberTaipan is the Australian version of CyberPatriot, which has been running in the US now for 10 years. "We need the kids coming through to be on the front foot and have the awareness."

Ms Price said pinpointing when malicious software had been deployed on personal computers would depend on observing changes in the computer's behaviour.

"It might be running slower, it might take your mouse elsewhere on your screen when you weren't expecting it," "It might also just flick screens, and sometimes our computers do these things anyway and that's how hackers can get away with it."

What was important, Ms Price said, was to "have that care factor to think, is that malicious or not".

5. Report it
And if you've been the victim of cyber-crime or been sent something potentially problematic, reporting scams can help to limit broader harm.

ABC.net:

You Might Also Read:

Australia’s Cybersecurity Adviser Calls For Privacy:

Vulnerable Australia Boosts National Cyber Security:

 

« Weaponising Stolen Data
UK CEOs Believe Cyber Attacks Are Inevitable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

XONA

XONA

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.