Over the last few years, everyone working in IT has been involved in, or knows someone who has been hit with some form of malicious ransomware.
Public cases this year include but are not limited to:
Over the last few years, everyone working in IT has been involved in, or knows someone who has been hit with some form of malicious ransomware.
Public cases this year include but are not limited to:
Tags Security, cyber security, data protection, data security, technology solutions, Databreach, ransom, back up, Commvault, Ransomware, disaster recovery, Zerto, Ivanti, cyber crime
Medical Records exposed in Health Sector Cyber Attacks
A Cyberattack on the Melbourne Heart Group, a specialist cardiology unit at Cabrini Hospital in Malvern, made news headlines on Thursday. The...
Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Health Sector, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII
Federal Government Acknowledge Hack on Parliament by ‘Sophisticated State Actor’
The Australian Government’s acknowledgement yesterday that a ‘sophisticated state actor’ was to blame for a breach...
Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII
Anatomy of a phishing campaign.
TDL are not unlike any other organisation in that we are not immune to phishing attacks and common scenarios where our internal staff are targeted in an attempt to...
Tags cyber security, data security, Phishing