<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Over the Wire</title>
	<atom:link href="https://overthewire.com.au/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://overthewire.com.au/tag/security/</link>
	<description></description>
	<lastBuildDate>Wed, 28 Aug 2019 02:47:21 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://overthewire.com.au/wp-content/uploads/2019/04/cropped-OvertheWire-favicon-32x32.png</url>
	<title>Security Archives - Over the Wire</title>
	<link>https://overthewire.com.au/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Impact Does a Data Breach Have on Your Customer Base?</title>
		<link>https://overthewire.com.au/what-impact-does-a-data-breach-have-on-your-customer-base/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 02 Nov 2018 05:20:26 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Business Internet]]></category>
		<category><![CDATA[Managed Data Networks]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=139</guid>

					<description><![CDATA[<p>We have gone through the technical aspects of data breaches in some detail, notably in our recent eBook. However, &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/what-impact-does-a-data-breach-have-on-your-customer-base/" class="more-link">Read more <span class="sr-only">What Impact Does a Data Breach Have on Your Customer Base?</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/what-impact-does-a-data-breach-have-on-your-customer-base/">What Impact Does a Data Breach Have on Your Customer Base?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We have gone through the technical aspects of data breaches in some detail,  <a href="https://overthewire.com.au/resources/security-ebook/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">notably in our recent eBook</a>. However, the business impacts are just as (if not more) important. </p>



<p>
	When your organisation suffers a data breach, the damage is more than 
lost data or costs to restore a system. Reputational damage can result 
in significant customer churn.
<br></p>



<h3 class="wp-block-heading">
	How do data breaches impact customer churn?
</h3>



<p>
	In IBM and The Ponemon Institute&#8217;s research report on data breaches in 
Australia, the organisations outlined the exact breakdown of breach 
costs.
</p>



<p>
	On average, a data breach cost businesses $139 per compromised file. 
That breaks down to $60 in technical costs, and $79 to indirect costs 
like customer churn. 
	That&#8217;s an average of 56 per cent of data breach costs coming through 
issues of customer retention.
</p>



<p>
	Some sectors are more susceptible to this than others. Financial 
services and technology companies recorded higher than average churn 
after a data breach, while hospitality and 
	retail are among those with more limited churn impacts.
</p>



<p> At its core, this is an issue of trust. If your organisation deals in  personal or private information, particularly financial data, there is  an expectation that your company will be  able to keep it secure. When it fails to do this, it fails at the core  of its business. That is perhaps why churn in those sectors is so much  higher than in retail or hospitality, where <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label="data security (opens in a new tab)">data security</a> is not a core theme. </p>



<p>
	Lost records mean lost trust, which in turn means lost business. But how can you go about minimising this churn?
<br></p>



<h3 class="wp-block-heading">
	How to minimise the business impacts of a data breach
</h3>



<p>
	In trend terms, the churn-related impacts of a data breach are on the 
decline. IBM and Ponemon&#8217;s research noted a 5.3 per cent drop in these 
costs over 2017, particularly among 
	companies that had a lower technical cost per record.
</p>



<p>
	One of the keys to this could be brand management. Your response to a 
data breach shouldn&#8217;t just be in line with the Notifiable Data Breaches 
scheme &#8211; it should be part of a wider 
	strategy to regain the trust of your customer base. 
<br></p>



<h4 class="wp-block-heading">
	1. Future-proofing and transparency
</h4>



<p>
	Consider Facebook&#8217;s response to the Cambridge Analytica scandal &#8211; one 
of the most reputationally damaging events in history. Beyond repairing 
the immediate harm, the company 
	completely overhauled its privacy settings and communicated those 
changes to users clearly. Well, relatively clearly. The company&#8217;s stock 
continued to fall after the event, but this 
	is a prime example of future-proofing in a transparent manner, of 
demonstrating a commitment to safety and security in the eyes of your 
customers.
<br></p>



<h4 class="wp-block-heading">
	2. Implement best practice early
</h4>



<p>
	Data breaches will, to a certain degree, always have an element of 
embarrassment to them. However, if your company can demonstrate to 
customers that it has a strong history of 
	best-practice data security, this may go a long way towards minimising 
churn.
</p>



<p>
	As an example of this done wrong, look no further than the Australian 
government. Early 2018 saw the leak of confidential written documents 
that were stored in a cabinet that was 
	sold in a second-hand store. Regular audits of your information storage
 and best-practice rules on digitisation are a must at the very least.
<br></p>



<h3 class="wp-block-heading">
	Use people you trust
</h3>



<div class="wp-block-image"><figure class="alignleft"><a href="https://overthewire.com.au/resources/cyber-security-tips/"><img fetchpriority="high" decoding="async" width="219" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-219x300.png" alt="" class="wp-image-144" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-219x300.png 219w, https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover.png 255w" sizes="(max-width: 219px) 100vw, 219px" /></a></figure></div>



<p>
	In many cases, businesses simply won&#8217;t have the in-house expertise 
required to implement proper data security strategies. And that&#8217;s OK! 
The team at Over the Wire are network 
	specialists &#8211; local experts who will partner with you to understand 
exactly what your business needs.
</p>



<p> It&#8217;s a surefire way of tightening up security, demonstrating to  customers that you take handling their information seriously, and  mitigating the churn that results from a data breach. Don&#8217;t forget to download and implement our white paper, <strong><a href="https://overthewire.com.au/resources/cyber-security-tips/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">6 Steps to Improve Your Business Cyber Security here</a></strong>.  </p>



<p> Act early, act in good faith and act smart. <strong><a href="https://overthewire.com.au/contact/">Get in touch with the Over the Wire team</a></strong> to minimise risks today. </p>
<p>The post <a href="https://overthewire.com.au/what-impact-does-a-data-breach-have-on-your-customer-base/">What Impact Does a Data Breach Have on Your Customer Base?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What protection does cyber insurance offer your business and who should invest in it?</title>
		<link>https://overthewire.com.au/what-protection-does-cyber-insurance-offer-your-business-and-who-should-invest-in-it/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 26 Sep 2018 06:02:50 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=244</guid>

					<description><![CDATA[<p>Data breaches: they&#8217;re expensive. Research from IBM and the Ponemon Institute puts the average per-record cost of breaches at &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/what-protection-does-cyber-insurance-offer-your-business-and-who-should-invest-in-it/" class="more-link">Read more <span class="sr-only">What protection does cyber insurance offer your business and who should invest in it?</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/what-protection-does-cyber-insurance-offer-your-business-and-who-should-invest-in-it/">What protection does cyber insurance offer your business and who should invest in it?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Data breaches: they&#8217;re expensive. Research from IBM and the Ponemon Institute puts the <a href="https://overthewire.com.au/news/consequences-of-a-data-breach" target="_blank" rel="noreferrer noopener">average per-record cost of breaches at $139</a>.
 
	Given that 41 per cent of their survey respondents had more than 1,000 
records affected, this takes the immediate cost impact of a data breach 
to over the $100,000 mark.
</p>



<p> Considering how quickly a breach can impact numerous records, that&#8217;s a  cost that many businesses won&#8217;t be able to bear. While we at Over the  Wire will always recommend  <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label="managed security services (opens in a new tab)">managed security services</a>  and prevention as the best cure, for the majority of organisations it’s  the employees that are the weakest link.  A mobile workforce, IoT  devices and spear-phishing  campaigns all present a potential cyber risk, and your security  policies need to address them all. </p>



<p>
	Enter cyber insurance. A relatively new phenomenon, it seems to offer 
financial protection for businesses that do suffer a data breach. But 
what sort of coverage does cyber insurance provide?
<br></p>



<h3 class="wp-block-heading">
	How cyber insurance works for Australian businesses
</h3>



<p>
	Cyber liability insurance generally covers against two primary costs: 
keeping your data and networks secure and the price of disruption to 
business continuity. Many policies can also cover 
	specific events or types of attacks, such as DDoS breaches or malware 
infection.
</p>



<p>
	The Government’s Australian Cyber Security Centre (ACSC) noted in its 
2017 threat report that cyber insurance was an industry undergoing rapid
 growth. As more high-profile attacks occur and 
	businesses become more aware of the widespread impacts a single breach 
can have, it&#8217;s popularity will increase.
</p>



<p>
	For example, IBISWorld research from the USA in 2016 showed 15.3 per 
cent annualised growth in the sector over the previous five years. While
 this growth hasn&#8217;t been reflected in the 
	Australian market yet, it&#8217;s only a matter of time before it gains more 
traction.
<br></p>



<h3 class="wp-block-heading">
	Can cyber insurance protect against every security threat?
</h3>



<p>
	This is unlikely. Insurance policies are, by design, tailored to 
protect a business or individual financially against specific events and
 have a wide set of exclusions. However, threats to cyber security 
	evolve at an alarming rate, with new strains of malware or variants on 
existing viruses cropping up every single day. We&#8217;ve actually covered 
this recently &#8211; you can see three cyber threats 
	that could defeat your legacy cyber security systems in 2018 
highlighted by the ACSC <a href="https://overthewire.com.au/news/3-cyber-threats-defeat-your-cyber-security" target="_blank" rel="noreferrer noopener">here</a>.
</p>



<p>
	The point is, a cyber insurance policy would have to be impossibly 
broad to provide adequate cover for an Australian business. It can 
mitigate some of the cost of recovery or lost information, 
	but the true breadth of a breach is as hard to cover as it is to 
predict.
</p>



<p>
	Further to this, the ACSC argues that the allotted payment may not be 
enough to cover the true cost of a data breach. The IBM/Ponemon research
 shows that the costs of a data breach can include:
</p>



<ul class="wp-block-list"><li>Information recovery and repair.</li><li>Breach identification and containment.</li><li>Notifying affected parts (including the Office of the Australian Information Commissioner) of the breach.</li><li>Fines for non-compliant reporting.</li><li>Customer churn and associated reputational damage.</li><li>Implementation of new security measures and training.</li><li>Lost intellectual property and reinforcing of this protection.</li></ul>



<p>
	Put simply, cyber insurance is a useful tool for mitigating some data breach costs. It is not, however, a catch-all.
<br></p>



<figure class="wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">$100,000 is the average cost to businesses for a single data breach, but the price you pay is far more than just financial. Do you understand the consequences of a data breach? <a href="https://t.co/4c0MV0rQDv">https://t.co/4c0MV0rQDv</a> <a href="https://t.co/sNuyxoLEGX">pic.twitter.com/sNuyxoLEGX</a></p>&mdash; Over the Wire (@Over_the_Wire) <a href="https://twitter.com/Over_the_Wire/status/981025324673638400?ref_src=twsrc%5Etfw">April 3, 2018</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<h3 class="wp-block-heading">
	Should you cyber insure your business?
</h3>



<p>
	The problem may be that the insurer may not want to insure your 
organisation unless you have the basic controls for cyber security in 
place. Therefore implementation of the Government’s 
	<a href="https://acsc.gov.au/publications/protect/essential-eight-explained.htm" target="_blank" rel="noreferrer noopener">Australian Signals Directorate Essential Eight</a> may be a pre-condition to obtaining a premium.
</p>



<p>
	As the ACSC rightly notes, cyber insurance has its place, and that is 
alongside existing data breach prevention strategies. In particular, 
organisations should be implementing the Essential 
	Eight, and take any extra steps that are easy to enforce at a business 
level.
</p>



<p>
	This is the true prevention method. Educate staff, tighten up your 
security protocols, whitelist and constantly patch/harden software, and 
limit your administrator privileges wherever possible. 
	Cyber insurance can limit your exposure to financial risk should the 
worst happen &#8211; but in itself is not a preventative measure.
</p>



<h3 class="wp-block-heading">
	Partner with the experts
</h3>



<div class="wp-block-image"><figure class="alignleft"><a href="https://overthewire.com.au/resources/cyber-security-tips/"><img decoding="async" width="219" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-219x300.png" alt="" class="wp-image-144" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-219x300.png 219w, https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover.png 255w" sizes="(max-width: 219px) 100vw, 219px" /></a></figure></div>



<p> To start planning your cyber security strategy, make sure you partner with experts. Our white paper <strong><a href="https://overthewire.com.au/resources/cyber-security-tips/">6 steps to improve your business cybersecurity</a></strong>  contains security tips you can put into action immediately to help protect your business. </p>



<p> Over the Wire&#8217;s <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank">managed security services</a> allows your business to mitigate risk by keeping ahead of security vulnerabilities.  To learn more <a href="https://overthewire.com.au/contact/">contact the Over the Wire team</a> today.  </p>
<p>The post <a href="https://overthewire.com.au/what-protection-does-cyber-insurance-offer-your-business-and-who-should-invest-in-it/">What protection does cyber insurance offer your business and who should invest in it?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 cyber threats that could defeat your legacy cyber security systems in 2018</title>
		<link>https://overthewire.com.au/3-cyber-threats-that-could-defeat-your-legacy-cyber-security-systems-in-2018/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 11 Sep 2018 05:26:46 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=152</guid>

					<description><![CDATA[<p>At this point, hopefully your organisation&#8217;s data security is up to scratch. The Notifiable Data Breaches scheme is in &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/3-cyber-threats-that-could-defeat-your-legacy-cyber-security-systems-in-2018/" class="more-link">Read more <span class="sr-only">3 cyber threats that could defeat your legacy cyber security systems in 2018</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/3-cyber-threats-that-could-defeat-your-legacy-cyber-security-systems-in-2018/">3 cyber threats that could defeat your legacy cyber security systems in 2018</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>At this point, hopefully your organisation&#8217;s data security is up to 
scratch. The Notifiable Data Breaches scheme is in full effect for 
organisations who have obligations under the Privacy Act. 
	Organisations should by now have conducted rigorous assessments of 
their data security and have comprehensive mitigation and response 
strategies in place.
</p>



<p>
	Everything from individual security protocols and education to the 
strength and number of your firewalls should be analysed, weak points 
addressed and fail-safes for identifying and reporting 
	breaches established.
</p>



<p>
	However, your data security can&#8217;t be static. In 2018, threats to your 
business move faster than ever before &#8211; the same technology that 
amplifies your organisation&#8217;s capabilities also provides 
	new entry points for malicious entities. You need to ensure you are 
protected from the latest threats that will otherwise bypass your legacy
 security systems. Here are three warnings that the 
	Government’s Australian Cyber Security Centre (ACSC) wants you to know 
about.
<br></p>



<h3 class="wp-block-heading">
	1. Risks with Meltdown and Spectre patches
</h3>



<p>
	In January, the ACSC reported on difficulties faced by organisations 
that attempted to patch operating systems to protect against Meltdown 
and Spectre. Microsoft released these updates, but 
	they proved incompatible with many existing security systems. In fact, 
Intel reported that there was a risk of information loss or corruption, 
as well as general system instability.
</p>



<p>
	Even patches from trusted, household names can sometimes fail to 
remediate your data security. A new patch variant has been released to 
mitigate these risks, and monthly security updates from 
	Windows can help to address any issues.
<br></p>



<h3 class="wp-block-heading">
	2. Bitcoin mining through Texthelp
</h3>



<p>
	Everyone wants to get their slice of the Bitcoin pie, and that goes 
double for malicious cyber criminals. On February 12, the ACSC alerted 
consumers to the presence of an unauthorised mining 
	system, embedded in Texthelp&#8217;s text-to-speech plugin, called 
BrowseAloud.
</p>



<p>
	While a breach of trust, the ACSC advises this is not a full-blown data
 breach. Over 4,000 websites that featured the BrowseAloud functionality
 had their websites infected with Coinhive code. 
	Coinhive generates Monero – a type of cryptocurrency. Texthelp took the
 plugin offline for a full examination of how the miner was inserted.
</p>



<p>
	This is a good example of early detection, even if the breach was not 
designed to cause harm to those using the plugin. All told, The Guardian
 reports that the cryptocurrency mining netted the 
	hackers $24 &#8211; hardly a worthwhile day&#8217;s work.
<br></p>



<h3 class="wp-block-heading">
	3. Vulnerabilities in Cisco software
</h3>



<p>
	Cisco produces a great deal of software, for anything from analytics to
 unified communications. In February 2018, they announced the discovery 
of vulnerabilities in their security products and 
	firewalls that could lead to denial of service attacks or remote code 
execution.
</p>



<p>
	The weakness could enable malicious entities to execute meaningless 
filler code, taking up memory and forcing a reset of your system or 
rendering it unable to approve VPN authentication requests.
<br></p>



<figure class="wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">Using a Cisco firewall? Check advice on ASA critical vulnerability asap – visit <a href="https://t.co/f25XfMTydi">https://t.co/f25XfMTydi</a> for <a href="https://twitter.com/hashtag/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw">#cybersecurity</a> information</p>&mdash; Australian Cyber Security Centre (@CyberGovAU) <a href="https://twitter.com/CyberGovAU/status/962217460744142848?ref_src=twsrc%5Etfw">February 10, 2018</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<h3 class="wp-block-heading">
	Take the next step with your data security
</h3>



<p>These 2018 cyber security threats have been dealt with swiftly by the  parties responsible for patching them. It is essential that system  administrators ensure that patches are deployed as soon  as possible in a systematic and controlled way. </p>



<p>It&#8217;s a 24-hour job, and that’s a big requirement &#8211; even for larger  organisations with dedicated resources. Labour hours, technological  know-how and the ability to execute restorative action are  all must-haves in this environment. That&#8217;s why managed security  services can be so critical. By handing the reins over to trusted, local  experts that are on hand at all hours, you can get the  best for your business without you personally needing to stay on top of  every new threat or development. <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Learn more about Over the Wire&#8217;s managed security here</a>.  </p>



<div class="wp-block-image"><figure class="alignleft"><a href="http://go.overthewire.com.au/Security-eBook.html" target="_blank" rel="noreferrer noopener"><img decoding="async" width="300" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-1-300x300.jpg" alt="" class="wp-image-159" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-1-300x300.jpg 300w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-1-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-1.jpg 350w" sizes="(max-width: 300px) 100vw, 300px" /></a></figure></div>



<p> There is no true endpoint in data security. Threats continue to evolve,  so security systems must be in a constant state of change. Take the  first step of improving your data security by  downloading our <strong>24 page</strong> <strong><a href="https://overthewire.com.au/resources/security-ebook/">cyber security eBook</a></strong>. </p>



<p> For expert advice on how to improve your data security, <a href="https://overthewire.com.au/contact/">contact the Over the Wire team today</a> or complete the form below and one of our friendly team members will be in touch with you shortly. </p>
<p>The post <a href="https://overthewire.com.au/3-cyber-threats-that-could-defeat-your-legacy-cyber-security-systems-in-2018/">3 cyber threats that could defeat your legacy cyber security systems in 2018</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 ways blockchain can help Australian businesses</title>
		<link>https://overthewire.com.au/5-ways-blockchain-can-help-australian-businesses/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 28 Aug 2018 05:16:06 +0000</pubDate>
				<category><![CDATA[Data Network Solutions]]></category>
		<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Managed Data Networks]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=129</guid>

					<description><![CDATA[<p>Blockchain technology is revolutionising how organisations work. By creating a decentralised system through which information passes, validated on a &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/5-ways-blockchain-can-help-australian-businesses/" class="more-link">Read more <span class="sr-only">5 ways blockchain can help Australian businesses</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/5-ways-blockchain-can-help-australian-businesses/">5 ways blockchain can help Australian businesses</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Blockchain technology is revolutionising how organisations work. By 
creating a decentralised system through which information passes, 
validated on a P2P basis rather than a 
	gatekeeping authority, businesses and not-for-profits can take 
advantage of huge potential efficiencies in operational processes that 
previously took days.
</p>



<p>
	For example, you may have heard about Ethereum, a public blockchain 
network used by the UN’s World Food Programme to underpin a cashless 
economy for Syrian refugees. The instant 
	validation of data means that this kind of process is applicable all 
around the world.
</p>



<p>
	In Australia, businesses are starting to take note &#8211; here are five ways your business could leverage blockchain technology.
<br></p>



<h3 class="wp-block-heading">
	1. Customer identification
</h3>



<p>
	By employing blockchain, financial services organisations could tap into untold efficiencies in customer identification.
</p>



<p>
	In a recent piece by iGTB Senior Business Analyst Binu Yohannan, he 
argues that the blockchain can serve as a single repository of customer 
identification information for an 
	entire industry sector. With the appropriate encryption and data 
security regulations, the blockchain could store a bank&#8217;s customer or 
transaction information in a database with 
	all other institutions in the same country or city.
</p>



<p>
	This gives organisations access to real-time, secure information that 
would otherwise be held up in the gatekeeping processes banks commit to 
on an individual basis.
<br></p>



<h3 class="wp-block-heading">
	2. Smart contracts
</h3>



<p>
	A smart contract is a computer program that contains a set of legal 
rules for negotiating the terms of an agreement.  The rules can 
automatically be enforced and the agreed 
	terms executed without the need for third party approval. 
</p>



<p> 
	Smart contract data is encrypted and stored on a shared ledger in a Blockchain so in theory it is secure and immutable.
</p>



<p> There have been exploits of smart contracts in the past, so it&#8217;s important that your code is as <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">airtight as your network security</a>. <br></p>



<h3 class="wp-block-heading">
	3. International payments
</h3>



<p>
	International payments can be made much faster and in a more 
transparent manner through the blockchain, according to Mastercard. The 
credit card giant is embracing the 
	blockchain in a bid to overcome speed- and cost-related hold-ups in 
global B2B transactions.
</p>



<p>
	An Accenture report suggests a 70 per cent drop in financial reporting 
costs through blockchain, as well as a 30 per cent decrease in 
compliance-related costs. By settling B2B 
	transactions in the digital sphere without third party risks, 
businesses can realise massive financial benefits.
<br></p>



<h3 class="wp-block-heading">
	4. Voting and corporate governance
</h3>



<p>
	The transparency and P2P verification of a blockchain network makes it 
ideal for ensuring information is both secure and accurate. While this 
has largely meant financial 
	institutions are benefiting from the tech, any enterprise involved in 
any kind of election can also reap the rewards.
</p>



<p>
	By skipping third parties (in this case an electoral authority), 
organisations can create a shared voting ledger that records and 
validates data without fear of tampering. 
	It&#8217;s ideal for true insight into how an employee base (or even an 
entire population) wishes to vote.
<br></p>



<h3 class="wp-block-heading">
5. Democratising the music industry
</h3>



<p>
A tale as old as time &#8211; how do artists get paid for the full value of their work? The answer could lie in blockchain.
</p>



<p>
Writing for Techcrunch in 2016, TechTalks founder Ben Dickson argued 
that a single database on a blockchain network could contain artists&#8217; 
music, including copyrights, licensing fees, time stamps and unique 
identifiers. Tamper-proof and concreted in the system, individuals and 
businesses could then buy the music for a transparent dollar value, 
which is then permanently recorded in the chain.
</p>



<p>
By skipping third parties like labels and streaming services, people can
 pay artists directly for their music in a transparent, efficient 
manner.
<br></p>



<h3 class="wp-block-heading">
	What are you waiting for?
</h3>



<div class="wp-block-image"><figure class="alignleft"><a href="http://go.overthewire.com.au/Security-eBook.html" target="_blank" rel="noreferrer noopener"><img loading="lazy" decoding="async" width="350" height="350" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg" alt="" class="wp-image-127" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg 350w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg 300w" sizes="auto, (max-width: 350px) 100vw, 350px" /></a></figure></div>



<p>
	
	Blockchain technology has levelled the playing field in so many ways. 
No longer do banks, record labels or other third-party authorities 
control information and money in the way they used to. It&#8217;s a complete 
democratisation of information, but it&#8217;s also absolutely 
	reliant on data networks &#8211; which can be fallible.
</p>



<p>
	The blockchain can revolutionise your business, yes, but without the 
right security protocols the information you submit to it could be 
vulnerable. 
</p>



<p> That&#8217;s where Over the Wire can help &#8211; <strong><a href="https://overthewire.com.au/resources/security-ebook/">read our comprehensive cyber security e-book</a></strong> to learn more about the primary areas  of cyber risk and find out more about beefing up your security. </p>
<p>The post <a href="https://overthewire.com.au/5-ways-blockchain-can-help-australian-businesses/">5 ways blockchain can help Australian businesses</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beyond the Essential Eight: Extra Business Cyber Security Tips</title>
		<link>https://overthewire.com.au/beyond-the-essential-eight-extra-business-cyber-security-tips/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 14 Aug 2018 05:58:43 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=241</guid>

					<description><![CDATA[<p>In 2018, cyber security threats are moving faster than ever before. The Essential Eight (EE) is a shortlist of &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/beyond-the-essential-eight-extra-business-cyber-security-tips/" class="more-link">Read more <span class="sr-only">Beyond the Essential Eight: Extra Business Cyber Security Tips</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/beyond-the-essential-eight-extra-business-cyber-security-tips/">Beyond the Essential Eight: Extra Business Cyber Security Tips</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In 2018, cyber security threats are moving faster than ever before.  The Essential Eight (EE) is a shortlist of critical data security  strategies developed by the Australian Signals Directorate  (ASD) that informed our White Paper, <strong><a href="https://overthewire.com.au/resources/cyber-security-tips/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">6 Steps to Improve your Business Cyber Security</a></strong>, but here are some additional mitigation tactics for your corporate defences. <br></p>



<h3 class="wp-block-heading">
	1. Protect Your Website Content Management System (CMS)
</h3>



<p>
	Good data security means protecting every access point to your network &#8211;
 for many businesses, that means protecting their external-facing CMS.
</p>



<p>
	A compromised CMS can lead to attackers accessing other protected areas
 of your website, installing malware or enabling remote access for third
 parties (like bitcoin mining tools), or perhaps even sabotaging your 
reputation by publishing unsavory content on your website. Even if 
	your website contains no private information, such a breach indicates 
website frailty and can damage trust with consumers.
</p>



<p>
	You can mitigate threats here by:
</p>



<ul class="wp-block-list"><li>Using a managed CMS hosting platform, or work within the ASD&#8217;s certified list of cloud providers.</li><li>Continuously maintain and patch your CMS to avoid 
publicly available frailties. This includes scripting environments, 
third party applications and custom code.</li><li>Remove or disable unnecessary third-party plugins and detailed error messages that attackers can exploit.</li><li>Employ change management in CMS deployment and file integrity monitoring.</li></ul>



<h3 class="wp-block-heading">
	2. Perfect your policies on social media
</h3>



<p>
	Social media: the Wild West of data security. Beyond the immediate risk
 of employees posting sensitive information on social media, staff who 
clearly identify as working for your 
	organisation can do reputational damage with even a seemingly benign 
personal post.
</p>



<p>
	The ASD warns that isolated incidences of information posted on social 
media, no matter how disparate, can be accrued by attackers and used for
 manipulation, targeted social engineering 
	campaigns or exerting undue influence on the poster.
</p>



<p>
	To mitigate risks in the social media environment, your policies must be comprehensive. They should cover:
</p>



<ul class="wp-block-list"><li>Whether staff can identify themselves as affiliated with the company on personal profiles.</li><li>Training and explicit guidelines on the use of corporate social media accounts.</li><li>When access to company social media accounts is given and revoked.</li><li>How to recover accounts should they be hijacked and when to alert management of a potential breach.</li><li>Password protocols &#8211; for example, to never have a browser remember account details.</li></ul>



<p>
	Social media can be a minefield to navigate, as so much of your 
security in this arena relies on basic common sense. Be as explicit as 
you can in your policy about any potential threats, 
	and you can go a long way to protecting your business.
<br></p>



<h3 class="wp-block-heading">
	3. Learn to identify socially-engineered messages
</h3>



<p>
	Social-engineering messages are a critical part of spear-phishing 
campaigns, which the Australian Cyber Security Centre identified as a 
common threat to Australian corporates. The more 
	education you can provide to staff on identifying these emails, the 
better-prepared your organisation will be in the future.
</p>



<p>
	Most of the time, this can be straightforward. Teach staff to ask the 
following whenever they receive an email regarding sensitive 
information:
</p>



<ul class="wp-block-list"><li>Is the sender recognisable, and is their email address spelled correctly?</li><li>Are they asking you to open a suspicious attachment or link?</li><li>Are they requesting sensitive information or the transfer of funds?</li><li>Is there a request for a specific activity (like enabling Microsoft Office macros)?</li><li>Is the sender asking for information that they should not usually be able to access?</li></ul>



<p>
	If any red flags arise, teach staff about what to do next. They should 
not delete the message, they should forward it to their IT department or
 other relevant body. Confirming details of 
	requests with the alleged sender over the phone or in person is also an
 excellent way of identifying socially engineered messages. To learn 
more about cyber threats through email, read
	our article <a href="https://overthewire.com.au/news/5-ways-your-business-can-prevent-email-compromise" target="_blank" rel="noreferrer noopener">5 Ways Your Business Can Prevent Email Compromise</a>. 
<br></p>



<h3 class="wp-block-heading">
	What to do next
</h3>



<div class="wp-block-image"><figure class="alignleft"><a href="http://go.overthewire.com.au/Security-eBook.html" target="_blank" rel="noreferrer noopener"><img loading="lazy" decoding="async" width="300" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg" alt="" class="wp-image-127" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg 300w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg 350w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></figure></div>



<p> It&#8217;s 2018, and extensive information about ourselves and our businesses  is online. It&#8217;s important to take every step possible to protect that  information, and prevent malicious attackers  from exploiting it. Dive deeper into the identification and protection  of cyber threats by downloading our <strong>24 page</strong> <strong><a href="https://overthewire.com.au/resources/security-ebook/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">cyber security eBook</a></strong>. </p>



<p> For expert advice on how to improve your data security, <a href="https://overthewire.com.au/contact/">contact the Over the Wire team today</a> or complete the form below and one of our friendly team members will be in touch with you shortly. </p>
<p>The post <a href="https://overthewire.com.au/beyond-the-essential-eight-extra-business-cyber-security-tips/">Beyond the Essential Eight: Extra Business Cyber Security Tips</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 household names you didn&#8217;t know suffered a data breach</title>
		<link>https://overthewire.com.au/10-household-names-you-didnt-know-suffered-a-data-breach/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 26 Jul 2018 05:29:49 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=156</guid>

					<description><![CDATA[<p>Suffering a data breach doesn&#8217;t mean your organisation is poorly run. While it&#8217;s crucial to have network security and &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/10-household-names-you-didnt-know-suffered-a-data-breach/" class="more-link">Read more <span class="sr-only">10 household names you didn&#8217;t know suffered a data breach</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/10-household-names-you-didnt-know-suffered-a-data-breach/">10 household names you didn&#8217;t know suffered a data breach</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Suffering a data breach doesn&#8217;t mean your organisation is poorly run.
 While it&#8217;s crucial to have network security and internal systems in 
place to keep your business protected, 
	cybercriminals are incredibly advanced. Some of the biggest 
organisations in the world fall prey to data breaches, as we&#8217;ll show you
 today.
</p>



<p>
	This information comes from Have I Been Pwnd (HIBP), a website that has
 recently partnered with the Australia Cyber Security Centre (ACSC). By 
identifying breaches and showcasing 
	the breadth and scale of them, both bodies hope to keep Australians up 
to date with the latest in data security. How many of these breached 
companies do you recognise?
</p>



<h3 class="wp-block-heading">1. Adobe</h3>



<p>The software giant, primarily known for its  design products, suffered a massive breach in 2013. This saw hackers  gain access to information on 153 million accounts,  including encrypted passwords.</p>



<h3 class="wp-block-heading">2. BitTorrent</h3>



<p>Even if you haven&#8217;t downloaded using P2P torrents, chances are you&#8217;ve heard of the big-name downloading clients &#8211; with BitTorrent chief among them. In January 2016,  forums for the software suffered a data breach, which led to more than 34,000 users having email and IP addresses compromised.<br></p>



<h3 class="wp-block-heading">3. Coachella</h3>



<p>Coachella is arguably the biggest music festival in the world, which perhaps made it a prime target for malicious cybercriminals. In February last year, hackers  took nearly 600,000 records from both the festival website and its associated forums, before trying to sell them online.<br></p>



<figure class="wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">New breach: 600k emails from the Coachella music festival were exposed in Feb. 67% were already in <a href="https://twitter.com/haveibeenpwned?ref_src=twsrc%5Etfw">@haveibeenpwned</a> <a href="https://t.co/LGaAniJH32">https://t.co/LGaAniJH32</a></p>&mdash; Have I Been Pwned (@haveibeenpwned) <a href="https://twitter.com/haveibeenpwned/status/879659627318845440?ref_src=twsrc%5Etfw">June 27, 2017</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<h3 class="wp-block-heading">4. Dominos</h3>



<p>Cybercriminals use leaked information in  many ways. In the case of Domino&#8217;s in France and Belgium, hackers  accessed 648,000 records in their network and tried to  hold the company to ransom or they would release the information  publicly. Domino&#8217;s didn&#8217;t pay up, and the data was released six months  after the June 2014 breach.</p>



<h3 class="wp-block-heading">5. LinkedIn</h3>



<p>One of the larger hacks on this list, more than 164 million LinkedIn users had their data compromised in 2012. However, these email addresses and passwords weren&#8217;t  marked as breached until May 2016, when the data popped up for sale on the dark web.<br></p>



<h3 class="wp-block-heading">6. Kickstarter</h3>



<p>The renowned crowd-funding site suffered a  data breach in 2014, which impacted some 5.2 million unique email  addresses. While personal financial details were kept safe,  usernames and salted SHA1 password hashes were revealed, which  can compromise other accounts with the same information.</p>



<h3 class="wp-block-heading">7. Snapchat</h3>



<p>Snapchat somewhat built their own demise in 2014. HIBP notes that shortly after the company stated a brute force attack on their database was theoretical, hackers did  just that and accessed 4.6 million users&#8217; names, locations and even phone numbers. <br></p>



<h3 class="wp-block-heading">8. Myspace</h3>



<p>Another case of delayed selling of information, this time eight years later. In 2008, cybercriminals breached MySpace&#8217;s security and gained the emails, usernames and  passwords of a whopping 359 million users. It wasn&#8217;t noticed until the information was put up for sale in May 2016.<br></p>



<figure class="wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">New breach: MySpace had 360M accounts hacked in about 2008. 18% were already in <a href="https://twitter.com/haveibeenpwned?ref_src=twsrc%5Etfw">@haveibeenpwned</a>. More background: <a href="https://t.co/m7A3eFyJ04">https://t.co/m7A3eFyJ04</a></p>&mdash; Have I Been Pwned (@haveibeenpwned) <a href="https://twitter.com/haveibeenpwned/status/737726521532547072?ref_src=twsrc%5Etfw">May 31, 2016</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
</div></figure>



<h3 class="wp-block-heading">9. Sony</h3>



<p>A household name, whose hack is already  household knowledge. In 2011, everything from Sony Pictures through to  the PlayStation Network was compromised due to an  SQL injection weakness. At 37,000 accounts breached, it is one of  the smallest breaches here in number of records, but one of the most  widely reported.</p>



<h3 class="wp-block-heading">10. Vodafone</h3>



<p>This breach occurred in Iceland but shows  how even trusted names in tech can unwittingly leave you exposed. In  2013, hackers got everything from credit card details  to passwords to SMS messaging histories for some 56,000 users.<br></p>



<h3 class="wp-block-heading">
	Has your email address been pwned?
</h3>



<p>Have I Been Pwnd (HIBP) is a platform that allows you to check if your  email address has been part of a data breach. With millions of email  addresses stolen over countless data breaches, if you&#8217;ve used the same  email address for several years, there is a fair chance it has made it  onto a hackers list or two. Check your email address <a rel="noreferrer noopener" href="https://haveibeenpwned.com/" target="_blank"><strong>here</strong></a>.  <br></p>



<h3 class="wp-block-heading">
	It can happen to anyone &#8211; so everyone should be prepared
</h3>



<div class="wp-block-image"><figure class="alignleft"><a href="https://overthewire.com.au/resources/cyber-security-tips/" target="_blank" rel="noreferrer noopener"><img loading="lazy" decoding="async" width="219" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-1-219x300.png" alt="" class="wp-image-163" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-1-219x300.png 219w, https://overthewire.com.au/wp-content/uploads/2018/12/6CyberSecurityTips-cover-1.png 255w" sizes="auto, (max-width: 219px) 100vw, 219px" /></a></figure></div>



<p>
	
	It&#8217;s important to note that data breaches can have a widespread impact.
 The ACSC notes that interdependencies between systems or shared cloud 
vulnerabilities can mean that when one 
	attack strikes, multiple organisations can suffer.
</p>



<p> This means your data security has to be thorough, widespread and  constantly evolving. To get you started, you can learn about six things  you can do right now to help protect your business  from a data breach today by downloading our white paper, <strong><a href="https://overthewire.com.au/resources/cyber-security-tips/">6 Steps to Improve your Business Cyber Security</a></strong>. </p>



<p> For a more in depth look at network security you can learn more about Over the Wire&#8217;s managed security solution, <strong><a href="https://overthewire.com.au/solutions/security-it-support/data-security/">Edge Security Protection</a></strong>,   our advanced firewall solution. To see how your business can benefit,  get in touch with the team at Over the Wire by completing the form  below. </p>
<p>The post <a href="https://overthewire.com.au/10-household-names-you-didnt-know-suffered-a-data-breach/">10 household names you didn&#8217;t know suffered a data breach</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3rd Generation of our Managed Security Platform Launched</title>
		<link>https://overthewire.com.au/3rd-generation-of-our-managed-security-platform-launched/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 05 Jul 2018 05:15:05 +0000</pubDate>
				<category><![CDATA[Awards & Company News]]></category>
		<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Company News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=125</guid>

					<description><![CDATA[<p>Following 18-months of R&#38;D, we have embraced Fortinet’s virtualised cloud deployment model to offer Managed Security and network services &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/3rd-generation-of-our-managed-security-platform-launched/" class="more-link">Read more <span class="sr-only">3rd Generation of our Managed Security Platform Launched</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/3rd-generation-of-our-managed-security-platform-launched/">3rd Generation of our Managed Security Platform Launched</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Following 18-months of R&amp;D, we have embraced <a rel="noreferrer noopener" href="https://www.fortinet.com/" target="_blank">Fortinet’s</a> virtualised cloud deployment model to offer  <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Managed Security and network services</a>  to Australian businesses. Over the Wire and subsidiary  Telarus have been using Fortinet’s security platform for nearly a  decade and we&#8217;re excited to launch our 3rd generation of the Managed  Security offering.  </p>



<div class="wp-block-image"><figure class="aligncenter"><img loading="lazy" decoding="async" width="520" height="347" src="http://overthewire.com.au/wp-content/uploads/2018/12/Partner-GOLD-Logo-2015.png" alt="" class="wp-image-130" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Partner-GOLD-Logo-2015.png 520w, https://overthewire.com.au/wp-content/uploads/2018/12/Partner-GOLD-Logo-2015-300x200.png 300w" sizes="auto, (max-width: 520px) 100vw, 520px" /></figure></div>



<p>
	Leveraging our existing private cloud environment, which has nodes in 
Melbourne, Sydney and Brisbane, we are able to expand the security 
platform onto our private cloud. 
	This means that our customers will be able to benefit from a diverse 
and complex managed security solution at the core of their business WAN 
while avoiding large hardware 
	capital expenditure.  
</p>



<p>
	“Previously we had deployed appliances in diverse data centres but 
found that this model lacked the flexibility required by growing 
businesses. Not only does the physical security appliance 
	model require the purchase of redundant hardware, but as soon as a 
client needs additional capacity or features there is the risk that all 
the old hardware becomes obsolete,” says <a href="https://www.linkedin.com/in/scott-allen-a07aa734/" target="_blank" rel="noreferrer noopener">Scott Allen</a>,
 
	Over the Wire’s National Manager of Presales. “By leveraging Fortinet’s
 VM licensing and moving the physical infrastructure requirements onto 
our existing cloud nodes we can rapidly deploy or 
	upgrade a customer’s environment without risk of having wasted tin 
sitting around at the end of the process, meaning a faster turnaround at
 a lower cost.”
</p>



<p>
	The decision to retain Fortinet as the security vendor extends a 
relationship that has been ongoing since 2010. The Fortinet Security 
Fabric enables Over the Wire customers to benefit from a 
	comprehensive suite of security intelligence, integrated seamlessly 
into their corporate network.
</p>



<p>
	 “Beyond the standard detection, prevention, content filtering and 
reporting, the Fortinet offering also gives Over the Wire customers 
greater peace-of-mind,” Scott continues. The Fortinet 
	 Security Fabric helps businesses to be one step ahead through the AI 
and Machine Learning Fortinet uses on data from millions of connected 
end-points worldwide, meaning better detection and 
	 blocking of ‘Zero-Day’ threats. “By adding this at the private network
 level and managing it for them, our customers get a comprehensive 
network security solution, not simply a security 
	 appliance deployed in isolation,” Scott Allen explains.
</p>



<p>With the <a rel="noreferrer noopener" href="https://overthewire.com.au/news/Notifiable-Data-Breaches-what-you-need-to-know" target="_blank">Notifiable Data Breach scheme introduced earlier this year</a> and other security issues in the news regularly, corporate data security has become a hot topic. At Over the Wire we believe  in the importance of a robust, managed security solution. This gives Australian businesses access to expert support and  enterprise-grade solution deployments that would otherwise be out of reach for most organisations. </p>



<p> <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank">Learn more</a> about Over the Wire&#8217;s Managed Security solutions online or <a href="https://overthewire.com.au/contact/">contact our team</a> to organise  a security discussion session today.  </p>
<p>The post <a href="https://overthewire.com.au/3rd-generation-of-our-managed-security-platform-launched/">3rd Generation of our Managed Security Platform Launched</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is private blockchain, and which types of organisation can benefit?</title>
		<link>https://overthewire.com.au/what-is-private-blockchain-and-which-types-of-organisation-can-benefit/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 20 Jun 2018 05:57:25 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=238</guid>

					<description><![CDATA[<p>Believe it or not, blockchain is nearly 10 years old. Since 2009, the technology has acted as the digital &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/what-is-private-blockchain-and-which-types-of-organisation-can-benefit/" class="more-link">Read more <span class="sr-only">What is private blockchain, and which types of organisation can benefit?</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/what-is-private-blockchain-and-which-types-of-organisation-can-benefit/">What is private blockchain, and which types of organisation can benefit?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Believe it or not, blockchain is nearly 10 years old. Since 2009, the
 technology has acted as the digital ledger through which Bitcoin 
transactions pass – it’s been the critical piece of 
	infrastructure behind the rise of cryptocurrencies.
</p>



<p>
	By establishing a shared digital ledger, public blockchain technology 
has levelled the playing field for currency-based transactions by 
democratising the flow of transactions, 
	making them visible to anyone.
</p>



<p>
	However, the same technology can be deployed within a private 
blockchain scenario. While more restricted in capability, this 
technology can have massive benefits for Australian business.
<br></p>



<h3 class="wp-block-heading">How does private blockchain work, and how is it different from public? </h3>



<p>In a public blockchain, anyone can read or make transactions as it is  an open-source model with no centralised database or governance. New  transactions are added to the existing  string (the proverbial blockchain), providing a comprehensive and  transparent history of all purchases and sales that every participant  has read, write or audit access to. </p>



<p>It allows for real-time transactions, with pre-existing nodes  (participants) validating credentials and balances instead of third  parties like banks. It&#8217;s an autonomous, self-validating,  constantly evolving chain of activity that anyone can interact with.  Bitcoin is the pre-eminent example of public blockchain technology. </p>



<p>Private blockchain operates under the same principles as public, but  with a set operator of the string and a clearly defined set of  boundaries. It contains all of the self-validating  benefits of the public blockchain, but retains the privacy and  centralised control that people associate with traditional transactional  models. <br></p>



<h3 class="wp-block-heading">The benefits of private blockchain for Australian businesses </h3>



<p>
	If a business wants to use blockchain technology, it will typically be for one of the following operations:
</p>



<ul class="wp-block-list"><li>Financial transactions.</li><li>Automate record transfer, keeping and sharing.</li><li>Vote counting (and preventing fraud in electoral processes).</li></ul>



<p> 
	Forbes reports that blockchain and biometric eyeball scanning 
technologies underpin the systems that support food distribution in the 
Syrian refugee crisis. While there are many 
	further uses of blockchain, at the core of its business functionality 
is the creation of transparent, stacking “ledgers” of information. This 
is where private blockchain can prove 
	extremely useful.
<br></p>



<h4 class="wp-block-heading">
	1. Security
</h4>



<p>
	In a private blockchain, organisations can control exactly who has 
read, write or audit permissions. This is critical for industries like 
financial and professional services, where 
	data will often be sensitive and its release <a href="https://www.overthewire.com.au/news/The-Timeline-of-a-Data-Breach-Infographic" target="_blank" rel="noreferrer noopener">could constitute a data breach</a>.
</p>



<p>
	Restricting administrator privileges is one of the key elements in the 
Australian Signals Directorate&#8217;s &#8216;Essential Eight&#8217;. By combining this 
tactic with the shared infrastructural 
	benefits that blockchain offers, businesses get the best of both 
worlds.
<br></p>



<h4 class="wp-block-heading">
	2. Automation
</h4>



<p>
	Because transactions are instantaneous and non-refundable, privatising 
blockchain can also greatly reduce red tape when transmitting 
communications or funds within a single organisation. 
	It&#8217;s not just the democratisation of transfers; it&#8217;s the automation of 
them, too.
<br></p>



<h4 class="wp-block-heading">
	3. Revolution
</h4>



<p>
	A recent EY (a global leader in knowledge management) blockchain 
revolution paper notes a core problem holding public blockchain back 
from widespread success &#8211; identity. The lack of 
	digital-based identity behind the blockchain means that it cannot break
 through current regulatory red tape.
</p>



<p>
	However, if organisations can establish a clear digital identity that 
people interact with through the blockchain (which is likely easier 
under a private model), EY argues that this 
	could revolutionise financial services. Clear, realised value is no 
longer relative to the blockchain &#8211; it becomes a tangible competitor to 
real-world markets.
<br></p>



<h3 class="wp-block-heading">
	What to look out for in private blockchain
</h3>



<p>
	
	The security of private blockchain does come with certain drawbacks. In
 the same sense that intranet is safer but more limited than the 
Internet, private blockchains are 
	unlikely to reach the operational capacity that public ones can.
</p>



<p>
	On the other hand, utilising public blockchain can mean businesses are 
restricted in the transactions they can make, lest secure information be
 made public.
</p>



<div class="wp-block-image"><figure class="alignleft"><a href="https://overthewire.com.au/resources/security-ebook/" target="_blank" rel="noreferrer noopener"><img loading="lazy" decoding="async" width="300" height="300" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg" alt="" class="wp-image-127" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg 300w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg 350w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></figure></div>



<p>
	Overall, the benefits of blockchain technology are profound. Shared 
infrastructure, less red tape and the ability to control permissions &#8211; 
it&#8217;s the kind of infrastructure that 
	many organisations have been waiting decades for. However, it&#8217;s 
important to support this new technology with the right safety protocols
 in place.
</p>



<p> Want to find out more about secure information and the future of Australian businesses? <strong><a href="https://overthewire.com.au/resources/security-ebook/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Read our comprehensive cyber security eBook</a></strong>. </p>
<p>The post <a href="https://overthewire.com.au/what-is-private-blockchain-and-which-types-of-organisation-can-benefit/">What is private blockchain, and which types of organisation can benefit?</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to spot (and stop) router compromise</title>
		<link>https://overthewire.com.au/how-to-spot-and-stop-router-compromise/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 02 May 2018 05:30:47 +0000</pubDate>
				<category><![CDATA[Data Network Solutions]]></category>
		<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Business Internet]]></category>
		<category><![CDATA[Managed Data Networks]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=161</guid>

					<description><![CDATA[<p>Router compromise. Hardly the most nerve-wracking phrase in the cybercrime lexicon, but one that is a fast-increasing threat for &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/how-to-spot-and-stop-router-compromise/" class="more-link">Read more <span class="sr-only">How to spot (and stop) router compromise</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/how-to-spot-and-stop-router-compromise/">How to spot (and stop) router compromise</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Router compromise. Hardly the most nerve-wracking phrase in the 
cybercrime lexicon, but one that is a fast-increasing threat for every 
single Australian business. Last year saw widespread warnings about 
router security, with computer electronics company ASUS identifying 
vulnerabilities in its hardware and the Australian Cyber Security Centre
 (ACSC) noting that many organisations lost critical configuration files
 due to router compromise. 
</p>



<p> It&#8217;s an issue that every organisation needs to put on their <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">data security agenda</a> &#8211; has yours begun the process? <br></p>



<h3 class="wp-block-heading">
	What is router compromise, and how does it work?
</h3>



<p>
	Router compromise is a fairly sophisticated form of data breach. 
Malicious entities conduct automated scans of routers to identify 
hardware that is vulnerable to an attack. This enables an adversary to 
extract configuration files, from which point they may be able to 
control or manipulate any devices that connect to your network, as well 
as the Internet connection itself.
</p>



<p>
	In most cases so far, cyber attacks on routers have focused on those 
with Simple Network Management Protocol (SNMP) that is exposed to the 
Internet. This is a default setting, usually established during the 
setup of a network. While many organisations turn SNMP off after this 
process is complete, many more have left it open, creating risk of 
compromise. The ACSC has noted that router switches with Cisco Smart 
Install exposed to the Internet are also susceptible to router scanning 
and hacking.
<br></p>



<h3 class="wp-block-heading">
	How can you identify router compromise?
</h3>



<p>
	If your organisation&#8217;s router has this exposure to attacks, there are 
some straightforward checks that network administrators can take 
immediately. You should check network logs for:
</p>



<ul class="wp-block-list"><li>Unexpected SNMP queries; or queries of unknown origin.</li><li>Command outputs or network configurations that have
 come from outside sources &#8211; particularly through Trivial File Transfer 
Protocol (TFTP).</li><li>Configurations that apply to GRE tunnels you would not expect changes to.</li></ul>



<p> 
	If any of these red flags emerge, it may be time to conduct a thorough 
assessment of the threat, in line with the Notifiable Data Breaches 
scheme guidelines from the Office of the Australian Information 
Commissioner. 
<br></p>



<h3 class="wp-block-heading">
	How can you prevent router compromise?
</h3>



<p>
	The first step in prevention is the simplest &#8211; if your router has SNMP 
which is exposed to the Internet, disable it. If you require read/write 
capabilities with your SNMP, ensure it cannot connect with unauthorised 
or untrusted third parties. Alternatively, you can upgrade your SNMP to 
version 3 and adjust all of the community strings to an appropriate 
setting.
</p>



<p>
	Similarly, for Cisco router users, if you do not require Cisco Smart 
Install to be active, disable it. You can also begin using Access 
Control Lists (ACL), which limit the access SNMP has to network 
configurations. Finally, you can configure your anti-spoofing protocols 
to drop any packets at the edge of your network which come from 
unauthorised sources.
</p>



<p>
	The ACSC is also proactively scanning Australian IP address ranges, looking for vulnerable or compromised routers.
<br></p>



<h3 class="wp-block-heading">
	Mitigate the impacts of router scanning today
</h3>



<p>
	
If your organisation suffers a router compromise-related attack, the 
costs can be far-reaching. Beyond the money spent eradicating the threat
 and hardening/patching your systems, significant data breaches require 
comprehensive follow-up action with both the OAIC and any affected third
 parties.
</p>



<p>
	Hardware may need to be replaced, staff upskilled, and consumer 
relations or company reputation may suffer irreparable damage if an 
attack threatens an individual&#8217;s safety.
</p>



<div class="wp-block-image"><figure class="alignleft is-resized"><a href="https://overthewire.com.au/resources/security-ebook/"><img loading="lazy" decoding="async" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-2-300x300.jpg" alt="" class="wp-image-169" width="300" height="300" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-2-300x300.jpg 300w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-2-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-2.jpg 350w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a></figure></div>



<p>
	Cyber criminals are becoming more and more sophisticated, with router 
scanning just one example of new ways your systems can be breached. To 
stay on the cutting edge of data security, it&#8217;s critical you work with 
partners who can provide around-the-clock service, proactively 
anticipate threats and shut down risks before they spread.
</p>



<p> To learn more about router vulnerability and other cyber risk areas, our <strong>24 page eBook</strong>, <strong><a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/resources/security-ebook/" target="_blank">IT Managers: Set your Network Defences to Stunning</a></strong>, is a great resource with tips you can use to identify, contain and prevent cyber security threats. You can <strong><a href="https://overthewire.com.au/resources/security-ebook/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">download it here</a></strong>.  </p>



<p> That&#8217;s the difference Over the Wire will make. <a href="https://overthewire.com.au/contact/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">Contact the team today</a> to find out more. </p>
<p>The post <a href="https://overthewire.com.au/how-to-spot-and-stop-router-compromise/">How to spot (and stop) router compromise</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Timeline of a Data Breach</title>
		<link>https://overthewire.com.au/the-timeline-of-a-data-breach/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 05:14:03 +0000</pubDate>
				<category><![CDATA[Security & IT Support Services]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://overthewire.com.au/?p=122</guid>

					<description><![CDATA[<p>Since the inception of the Notifiable Data Breaches (NDB) scheme in Feburary 2018, data breaches are required to be &#8230; </p>
<p class="link-more"><a href="https://overthewire.com.au/the-timeline-of-a-data-breach/" class="more-link">Read more <span class="sr-only">The Timeline of a Data Breach</span><i class="tricon tricon-sm" aria-hidden="true"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24"><path d="M10 6L8.59 7.41 13.17 12l-4.58 4.59L10 18l6-6z"/></svg></i></a></p>
<p>The post <a href="https://overthewire.com.au/the-timeline-of-a-data-breach/">The Timeline of a Data Breach</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>
	Since the inception of the <a href="https://overthewire.com.au/news/Notifiable-Data-Breaches-what-you-need-to-know" target="_blank" rel="noreferrer noopener">Notifiable Data Breaches (NDB) scheme</a>
 in Feburary 2018, 
	data breaches are required to be reported and Australian businesses 
have even more responsibility to demonstrate an aggressive approach to 
managing cyber-risk. To help businesses 
	understand how this process works we&#8217;ve prepared the following 
infographic. 
</p>



<p> Over the Wire provides a 24/7 protection and notification <a href="https://overthewire.com.au/solutions/security-it-support/data-security/">managed security</a> service,  with local specialists on hand to monitor and mitigate any threats to your company. Find out more about our security service <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">here</a>.  </p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="1180" height="5979" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security_Data-Breach-Timeline_Infographic.png" alt="" class="wp-image-126" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security_Data-Breach-Timeline_Infographic.png 1180w, https://overthewire.com.au/wp-content/uploads/2018/12/Security_Data-Breach-Timeline_Infographic-59x300.png 59w, https://overthewire.com.au/wp-content/uploads/2018/12/Security_Data-Breach-Timeline_Infographic-768x3891.png 768w, https://overthewire.com.au/wp-content/uploads/2018/12/Security_Data-Breach-Timeline_Infographic-202x1024.png 202w" sizes="auto, (max-width: 1180px) 100vw, 1180px" /></figure>



<div style="height:100px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-image"><figure class="alignright is-resized"><a href="https://overthewire.com.au/resources/security-ebook/"><img loading="lazy" decoding="async" src="http://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg" alt="" class="wp-image-127" width="350" height="350" srcset="https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover.jpg 350w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-150x150.jpg 150w, https://overthewire.com.au/wp-content/uploads/2018/12/Security-cover-300x300.jpg 300w" sizes="auto, (max-width: 350px) 100vw, 350px" /></a></figure></div>



<h3 class="wp-block-heading">
	How we can help
</h3>



<p> Over the Wire provides a 24/7 protection and notification <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank">managed security</a> service,  with local specialists on hand to monitor and mitigate any threats to your company. Find out more about our security service <a href="https://overthewire.com.au/solutions/security-it-support/data-security/" target="_blank" rel="noreferrer noopener" aria-label=" (opens in a new tab)">here</a>. Or complete the form below. </p>



<p> To understand more about how breaches occur and how to prevent them, our <strong>24 page eBook</strong>, <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://overthewire.com.au/resources/security-ebook/" target="_blank">IT Managers: Set your Network Defences to Stunning</a>, is a great resource with tips you can use to identify, contain and prevent cyber security threats. You can <strong><a href="https://overthewire.com.au/resources/security-ebook/">download it here</a></strong>.  </p>
<p>The post <a href="https://overthewire.com.au/the-timeline-of-a-data-breach/">The Timeline of a Data Breach</a> appeared first on <a href="https://overthewire.com.au">Over the Wire</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
