What’s the fuss about cybersecurity?

By Rob McKie - September 6, 2018

Thousands of Australian business are subject to cybersecurity breaches and crimes each year, with threats growing and evolving daily.

Factors driving cyber threats

The blurred distinction between social and professional spheres, together with growth in the internet of things (IoT) and 24/7 connectivity is having an immense impact on organisations and cybersecurity.

Merging social spheres

Access

Socioeconomic disparity

The line between public and private realms is evolving. Personal devices are commonly used for work purposes and vice versa. The BYO device trend has implications for the security of both personal and business data and information.

Improvements in telecommunications infrastructure and development in mobile technologies has changed the way businesses operate. Businesses are now connected and accessible 24/7, which makes security and monitoring a critical component of a workplaces’ digital and mobility solutions.

The rapid rate of change in digital technologies has led to social stratification – not simply in terms of the have’s and have not’s but in terms of proficiency in understanding and use of technologies. This knowledge gap allows for exploitation, giving rise to the need for ongoing communication and training.

Understanding the types of threats

Cyberthreats aren’t simply limited to hacking and viruses. There are many types of threats with thousands of permutations that pose an ongoing risk to you and your organisation. We briefly consider the threats most commonly levelled at organisations.

Malware

Virus

Spyware

Worms

Trojan

An application designed to replicate and spread from device to device with the aim to modify or corrupt a devices’ files and/or operation.

An application covertly installed on a device to obtain information without the users’ knowledge or consent.

An application designed to replicate and spread among devices, often impacting performance and bandwidth, and used to gain access to your device to use it for nefarious purposes.

Malicious code hidden within a seemingly legitimate application to launch malware on a device.

Other cyber threats

Ransomware

Phishing emails

An application that restricts a user from using part or all of a device, unless the user pays a fee to the hijacker to unlock the system.

Illegitimate emails used to distribute malicious applications that allow cybercriminals to access a users’ private information, accounts or device(s).

Understanding the threats and how they can access your systems is the first step in protecting your organisation. Click here for steps to protect your organisation.


Contact our experts


Other articles


 

Top of Page







IN THIS SECTION:


Rob Southwell

Rob Southwell's picture

Sydney

Managing Partner and Partner – Private Business and Family Advisory


> View profile

Brendan Britten

Brendan Britten's picture

Melbourne

Managing Partner and Executive Director/Partner- Business Advisory and Assurance


> View profile

Nigel Fischer

Nigel Fischer's picture

Brisbane

Managing Partner - Private Business and Family Advisory


> View profile

Michael Minter

Michael Minter's picture

Newcastle

Managing Partner


> View profile

Leon Mok

Leon Mok's picture

Perth

Managing Director


> View profile

Tom Verco

Tom Verco's picture

Adelaide

Managing Principal - Private Business and Family Advisory


> View profile



Partnership fraud

SUCCESS

Paperwork and independent advice saves partnerships from fraud

Discover more

Kia Ora Horse Stud

CASE STUDY

Pitcher Partners fills a Financial Manager gap to keep the business on track

Discover more

Fuel Injection Company Administration

LEADERSHIP

A fuel injection company began life as an Australian public company before being acquired by a UK publicly listed company while in the research and development stage of a “green...

Discover more



@PitcherPartner CHILD SUPPORT | There’s no doubt that the breakdown of family relationships is both stressful & expensive, especial… https://t.co/sgz7UH7Yhz