• Architects of Change Perspective

The Art of Data Protection to Avoid a Breach

Over the last few years, everyone working in IT has been involved in, or knows someone who has been hit with some form of malicious ransomware. 

Public cases this year include but are not limited to:

Continue Reading ››

Tags Security, cyber security, data protection, data security, technology solutions, Databreach, ransom, back up, Commvault, Ransomware, disaster recovery, Zerto, Ivanti, cyber crime

White Hat Hacking with TDL | Another Breach for the Health Sector!

Medical Records exposed in Health Sector Cyber Attacks

 A Cyberattack on the Melbourne Heart Group, a specialist cardiology unit at Cabrini Hospital in Malvern, made news headlines on Thursday. The...

Continue Reading ››

Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Health Sector, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII

White Hat Hacking with TDL | Government Acknowledges Hack on Parliament

Federal Government Acknowledge Hack on Parliament by ‘Sophisticated State Actor’

The Australian Government’s acknowledgement yesterday that a ‘sophisticated state actor’ was to blame for a breach...

Continue Reading ››

Tags Security, cyber security, Privacy, Phishing, Databreach, OAIC, Cybercriminals, Human Error, Malware, Malicious Attacks, Attackers, Cybersecurity, Vulnerability, Breach, Scam, Scammers, Flaw, Encryption, Fraudulent Activity, RDP, Threat Actor, Dot-Accounts, Government, Federal Government, ASIO, Intelligence Agencies, Russian Hackers, Hackers, Interference, Personally Identifiable Information, Chinese Hackers, Hack, PII

Tales from the Crypt…o world

Anatomy of a phishing campaign.

TDL are not unlike any other organisation in that we are not immune to phishing attacks and common scenarios where our internal staff are targeted in an attempt to...

Continue Reading ››

Tags cyber security, data security, Phishing

1 2
»

Like to learn more? Contact us today.

Align your business strategies with the business goals