Our Cyber Security Blog

Our Cyber Security Blog 1

Digital Spring

This Spring, let’s hack our own digital devices and clean them up so they remain the workhorses they need to be, save the battery and ultimately, avoid a malicious actor crawling through the metaphorical window. Part clean up, part safety procedure…start here:

Our Cyber Security Blog 2

Cyber in Pink

The goal for cybersecurity teams is to reduce and ultimately eliminate digital exposure to “protect businesses, people and information”. Women have been massively underrepresented in technology and the push to include women at the table for training is now tangible and real.

Our Cyber Security Blog 3
cyber fit

Hearty hacking

The hacking of any social media account has ramifications far beyond that one platform or that one individual. An individual may be the initial target to gain access to far reaching information, data or resources, privately or publicly. It can dismantle capability of a website or it can disrupt the power supply to a rural village.

Our Cyber Security Blog 4

Uber: fight or flight

Uber appeared first in 2009 and it was introduced as a ride sharing service accessed through mobile phones, which was a world first. Founders Travis Kalanick and Garrett Camp had idealistic goals that would put the world into motion, no matter the cost. That cowboy ethic would have a devastating effect on traditional taxi services globally. The Uber Files have revealed the co-founders used a secret software program, Heaven, to illegally monitor movements of celebrities, politicians and employees. They also did nothing to protect their drivers from violent protests involving taxi drivers.

Our Cyber Security Blog 5

Virtually Late

Play it smart with crytpocurrency investment, maintain some scepticism so that hype and marketing doesn’t get in the way of a good investment.

Our Cyber Security Blog 6
Artificial Intelligence

Artificial Human Vibes

His belief of LaMDA as a ‘sentient being’ was uncovered after publishing the transcript of hundreds of conversations. He also wrote to Google asking LaMDA to be represented by a lawyer and enjoy worker rights at the company.

Our Cyber Security Blog 7

The time is now

The Australian Cyber Security Centre (ACSC) has issued an advisory report for companies to “urgently adopt an enhanced cyber security posture”. This is a driver for all corporations operating in Australia beyond the financial services industry to manage cyber risk effectively and efficiently.

Our Cyber Security Blog 8


As the crypto frenzy descends into freefall status and Elon Musk reneges on his total commitment to a Twitter takeover at the exorbitant per share price of $54.20 based on the fake account ratio, we are checking in to something more wholesome. The 21st AusCERT conference is delivering a message of kindness to shape the narrative of cyber-security in retaliation to uber threats of unkind actors.

Our Cyber Security Blog 9

All the ugliness of Pegasus cont…

The Pegasus story unravels at such a pace and it is easy to think that people have moved on but then another angle entirely is presented. This time it is Catalan independence, it’s not a new angle by any stretch but one that has finally made its way to mainstream media. Ronan Farrow has done a long form piece of investigative journalism on the threat of modern spyware, with a focus on NSO groups spyware.