Cybercrime Is A Real Economic Threat

If you've been caught up in an online scam you'd know what a headache they can cause and while businesses large and small are under threat, anyone with a presence online can be the victim of a cyber attack. Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs.

According to one of Australia's leading experts on cyber security, cybercrime is one of the most significant existential threats we'll face in our economy.

Alistair MacGibbon, national cyber security adviser and the head of the Australian Cyber Security Centre, thinks it is more important than ever that we knew how to keep ourselves safe online.

"If we get cyber security right as a community, we can get all the advantages of connected technologies," he said. "The millions of us online are the weakest link.

1. Change 'pass-phrase' often
If you think your one-word password with a number at the end makes the cut for online security, think again. 
"We all need a strong and hard-to-guess password," Mr MacGibbon said.
"Really we should call it a pass-phrase because it can be a series of words that you string together."
And if you're using the same password across multiple sites to keep it simple, you're likely making it easy for online criminals.
"It's important to have a different [password] for each of the services that you use," Mr MacGibbon said. "If you use the same password across multiple sites and it's compromised in one place, then it can also be used in others."

2. Update operating systems
With a multitude of programs installed across a range of devices used daily, it can seem as though there's constantly program updates required.  According to Mr MacGibbon, those program updates can be critical.

"Software manufacturers and hardware manufacturers have made it easy for us," he said. "We can just automate [updates] every time we login, which checks if we're running the latest operating system on our computer. "If not, let the system update itself."

3. Back up data
If you want to be one step ahead of hackers, Mr MacGibbon advises developing a system to back up data. 

"One of the fastest growing types of crime is a thing called ransomware," he said. "Unhelpful criminals will send us one of those links that's executable in an email. "We open it up and this malicious code or malware goes onto the computer and locks up files."
But if you've got your precious assets and material saved elsewhere, you've done yourself a favour. 

"If I've backed it up then I just tell the criminals that I'm not going to pay the ransom to unlock it and get my files going again," Mr MacGibbon said.

4. Identify dodgy and back away
As part of an initiative driven by the Australian Cyber Security Growth Network (AustCyber), school students across the country have been invited to participate in a new cyber defence challenge. The competition, called CyberTaipan, is designed to get students to go online and think like a hacker so they can better protect themselves from cyber-crime.

"Cyber security is going to be a component of every single job going forward," said network chief executive Michelle Price. "CyberTaipan is the Australian version of CyberPatriot, which has been running in the US now for 10 years. "We need the kids coming through to be on the front foot and have the awareness."

Ms Price said pinpointing when malicious software had been deployed on personal computers would depend on observing changes in the computer's behaviour.

"It might be running slower, it might take your mouse elsewhere on your screen when you weren't expecting it," "It might also just flick screens, and sometimes our computers do these things anyway and that's how hackers can get away with it."

What was important, Ms Price said, was to "have that care factor to think, is that malicious or not".

5. Report it
And if you've been the victim of cyber-crime or been sent something potentially problematic, reporting scams can help to limit broader harm.

ABC.net:

You Might Also Read:

Australia’s Cybersecurity Adviser Calls For Privacy:

Vulnerable Australia Boosts National Cyber Security:

 

« Weaponising Stolen Data
UK CEOs Believe Cyber Attacks Are Inevitable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

EasyDMARC

EasyDMARC

EasyDMARC deliver the most comprehensive product for anyone who strives to build the most secure possible defence system for their email ecosystem.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.