What is cybersquatting, domain squatting and how to prevent it What is cybersquatting? Cybersquatting refers to the act of registering or using a domain name that cashes in on another person’s (or business’s) trademark. Also known as domain squatting, cybersquatting is considered a cyber crime, with victims able to take those using their name for..
Artificial Intelligence in Cybersecurity The term “cybersecurity” refers to the systems that organisations put in place to counter malicious online attacks and safeguard networks against unauthorised access. In 2019 you’d be hard-pressed to find a business or organisation that doesn’t rely on computer networks to process, move or store private and potentially sensitive information. As..
What Is Ransomware Government, business, and other organisations increasingly place cybersecurity atop their list of priorities as cybercriminals and terrorists grow ever more sophisticated. Malware in all its forms can immediately cripple a system or bleed it of vital information for years. Ransomware, however, comes from purely criminal intent. Ransomware Defined Ransomware, or ransom malware,..
Best practices in vulnerability management Data breaches continue to cost businesses and waste resources, with organisations looking for new ways to avoid threats and manage critical software systems. Vulnerability management is an important piece of the security puzzle and a mandatory process for development and security teams. Effective and efficient vulnerability management involves more than..
Security challenges for SCADA devices Modern organisations have to deal with more security threats than ever before. The changing nature of the digital landscape continues to affect workplace security, from cloud migration and mobile devices through to online commerce and interactive web applications. Networks themselves are also changing, with elastic and highly connected network architecture..
How to Build Cyber Security Responsibility with your Employees Cyber security is a priority for businesses across Australia and New Zealand, particularly since cyber attacks and intrusions are a growing problem. What’s particularly worrying about cyber integrity, however, is how often human error causes security breaches. Statistics show that employee mistakes cause the most cyber..
Best practices in Cloud Security Organisations continue to migrate to the cloud in order to enhance productivity, improve accessibility, and promote compliance standards. While the cloud is fundamentally changing how we work, communicate, and manage information, security is one of the areas holding people back. As one of the fundamental building blocks of a successful..
What is Phishing? From packet sniffing to malware, there are many different methods that hackers employ to get access to sensitive information, but sometimes the simplest methods are the most effective. Phishing is a hacking method that’s been used since the 1990s to extract usernames, passwords, and other sensitive information from users. It’s a relatively..
What is a Data Breach? As technology continues to advance, businesses both large and small are collecting data from their customers in exponentially increasing volumes. “Big Data” is the term used to describe the vast amounts of data that is being collected by organisations today, which might amount to as much as several exabytes (an exabyte..
Australian specialist security & managed provider GA Systems is now a Gold Partner with Netskope, adding the highest ranked CASB vendor its leading Managed Security Service GA Systems service deliver fully managed security operations, round the clock incident response and strategic advisory consulting, all powered by the industry’s leading advanced security tools and technologies. Gordon..