Social media and its hidden threats
Social media, where do I start. Social media has taken over our lives especially with the millennials and all of the following generations, we live and breath it.
Craig Ford | 16 Apr | Read more
Social media, where do I start. Social media has taken over our lives especially with the millennials and all of the following generations, we live and breath it.
Craig Ford | 16 Apr | Read more
Cyberbullying is a big problem in our society with around one in five Australian teens being a victim. Wow, that is huge, we need to find a solution to this issue.
Craig Ford | 17 Apr | Read more
Office 365 is a name that is widely known and is the preferred email hosting platform for many organisations in Australia (unless you're a Google fan.
Craig Ford | 15 Apr | Read more
I want to do something a little different with this article, I want to take you down the rabbit hole that is IoT and the dark side that is lurking around the corner that I know is going to bare its ugly head at some point in our future.
Craig Ford | 12 Apr | Read more
This is a strange topic as the idea of collaboration in the security industry is basically that direct competitors come together and openly share how they do things, how they secure their systems, what works and what doesn't.
Craig Ford | 09 Apr | Read more
Over the last few years, I have listened to many presentations, read many articles and countless white papers on the cybersecurity skills gap.
Craig Ford | 08 Apr | Read more
During 2018 cybercrime generated around $1.5 Trillion Dollars (I just pictured a Dr Evil scene with his pinkie pose and laugh he had in the Austin powers movie from the late '90s in my head) for the underworld economy and possibly APT’s.
Craig Ford | 05 Apr | Read more
Before I start I want to be clear, I work for an MSP/MSSP in Brisbane, so before all of the rest of you, MSSP's and MSP's throw me under the proverbial bus read my article and understand what the point I am trying to get across here first. Then if you still want to do that then go for it.
Craig Ford | 03 Apr | Read more
It was Friday morning, I looked over at my alarm clock waiting for it to click over to 5 am, it was time to get up and get ready to take the train down to Brisbane CBD for the conference.
Craig Ford | 01 Apr | Read more
IoT is the latest buzz topic that is spreading like wildfire, almost everywhere you look someone else is discussing IoT and what it is going to mean for us as a society, the benefits that it can bring but what about the negatives?
Craig Ford | 25 Mar | Read more
Ransomware will make even the most experienced IT professional shiver..
Craig Ford | 11 Mar | Read more
The next time you are visiting any business, private or public look around and take things in with a – let’s call it “security filter”.
Craig Ford | 08 Mar | Read more
The recent and unexpected update to the Australian Signals Directorate’s Essential Eight Maturity Model serves to keep the ASD’s guidelines relevant going forward and address the latest weak points in IT security. What stays the same though is the ASD’s guidance on practical updates on how to stay ahead.
Alex Duffy, emt Distribution | 06 Mar | Read more
Cybercrime costs the Australian economy $1 billion per year. In 2019 alone, the ACCC has already received 2,229 phishing scam reports, with women losing more money than men to phishing scams, and Victorians losing more money than their compatriots north of the border.
Nathan Boddam-Whetham, Avanade Australia | 01 Mar | Read more
I lay awake in bed looking over at the alarm clock on my side table it indicates 5:59 am, I am waiting for it to click over to 6 am and the alarm to sound. Click.
Craig Ford | 26 Feb | Read more
This had been a long gig, with many long nights just crawling through logs, or reconnaissance data but as I sipped from my cold cup of coffee, it clicked. I had access.
Craig Ford | 25 Feb | Read more
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
By CSO staff | 22 Feb | Read more
I am a security professional / would-be ethical hacker and I feel that the glorified image our society has of my profession is all wrong.
Craig Ford | 07 Feb | Read more
Scammers exploit Google's Gmail policy on dots in email addresses to ramp up fraud campaigns.
Security is an industry obsessed with measurements. And as 2018 ends, it naturally becomes the time to take stock of the year that was—the threats that have changed the face of cybersecurity, the evolution of attacks and, more importantly, the learnings for 2019.
Aaron Bugal | 11 Dec | Read more