Cybercrime Is A Real Economic Threat

If you've been caught up in an online scam you'd know what a headache they can cause and while businesses large and small are under threat, anyone with a presence online can be the victim of a cyber attack. Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs.

According to one of Australia's leading experts on cyber security, cybercrime is one of the most significant existential threats we'll face in our economy.

Alistair MacGibbon, national cyber security adviser and the head of the Australian Cyber Security Centre, thinks it is more important than ever that we knew how to keep ourselves safe online.

"If we get cyber security right as a community, we can get all the advantages of connected technologies," he said. "The millions of us online are the weakest link.

1. Change 'pass-phrase' often
If you think your one-word password with a number at the end makes the cut for online security, think again. 
"We all need a strong and hard-to-guess password," Mr MacGibbon said.
"Really we should call it a pass-phrase because it can be a series of words that you string together."
And if you're using the same password across multiple sites to keep it simple, you're likely making it easy for online criminals.
"It's important to have a different [password] for each of the services that you use," Mr MacGibbon said. "If you use the same password across multiple sites and it's compromised in one place, then it can also be used in others."

2. Update operating systems
With a multitude of programs installed across a range of devices used daily, it can seem as though there's constantly program updates required.  According to Mr MacGibbon, those program updates can be critical.

"Software manufacturers and hardware manufacturers have made it easy for us," he said. "We can just automate [updates] every time we login, which checks if we're running the latest operating system on our computer. "If not, let the system update itself."

3. Back up data
If you want to be one step ahead of hackers, Mr MacGibbon advises developing a system to back up data. 

"One of the fastest growing types of crime is a thing called ransomware," he said. "Unhelpful criminals will send us one of those links that's executable in an email. "We open it up and this malicious code or malware goes onto the computer and locks up files."
But if you've got your precious assets and material saved elsewhere, you've done yourself a favour. 

"If I've backed it up then I just tell the criminals that I'm not going to pay the ransom to unlock it and get my files going again," Mr MacGibbon said.

4. Identify dodgy and back away
As part of an initiative driven by the Australian Cyber Security Growth Network (AustCyber), school students across the country have been invited to participate in a new cyber defence challenge. The competition, called CyberTaipan, is designed to get students to go online and think like a hacker so they can better protect themselves from cyber-crime.

"Cyber security is going to be a component of every single job going forward," said network chief executive Michelle Price. "CyberTaipan is the Australian version of CyberPatriot, which has been running in the US now for 10 years. "We need the kids coming through to be on the front foot and have the awareness."

Ms Price said pinpointing when malicious software had been deployed on personal computers would depend on observing changes in the computer's behaviour.

"It might be running slower, it might take your mouse elsewhere on your screen when you weren't expecting it," "It might also just flick screens, and sometimes our computers do these things anyway and that's how hackers can get away with it."

What was important, Ms Price said, was to "have that care factor to think, is that malicious or not".

5. Report it
And if you've been the victim of cyber-crime or been sent something potentially problematic, reporting scams can help to limit broader harm.

ABC.net:

You Might Also Read:

Australia’s Cybersecurity Adviser Calls For Privacy:

Vulnerable Australia Boosts National Cyber Security:

 

« Weaponising Stolen Data
UK CEOs Believe Cyber Attacks Are Inevitable »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.