What’s the fuss about cybersecurity?

By Rob McKie - September 6, 2018

Thousands of Australian business are subject to cybersecurity breaches and crimes each year, with threats growing and evolving daily.

Factors driving cyber threats

The blurred distinction between social and professional spheres, together with growth in the internet of things (IoT) and 24/7 connectivity is having an immense impact on organisations and cybersecurity.

Merging social spheres


Socioeconomic disparity

The line between public and private realms is evolving. Personal devices are commonly used for work purposes and vice versa. The BYO device trend has implications for the security of both personal and business data and information.

Improvements in telecommunications infrastructure and development in mobile technologies has changed the way businesses operate. Businesses are now connected and accessible 24/7, which makes security and monitoring a critical component of a workplaces’ digital and mobility solutions.

The rapid rate of change in digital technologies has led to social stratification – not simply in terms of the have’s and have not’s but in terms of proficiency in understanding and use of technologies. This knowledge gap allows for exploitation, giving rise to the need for ongoing communication and training.

Understanding the types of threats

Cyberthreats aren’t simply limited to hacking and viruses. There are many types of threats with thousands of permutations that pose an ongoing risk to you and your organisation. We briefly consider the threats most commonly levelled at organisations.






An application designed to replicate and spread from device to device with the aim to modify or corrupt a devices’ files and/or operation.

An application covertly installed on a device to obtain information without the users’ knowledge or consent.

An application designed to replicate and spread among devices, often impacting performance and bandwidth, and used to gain access to your device to use it for nefarious purposes.

Malicious code hidden within a seemingly legitimate application to launch malware on a device.

Other cyber threats


Phishing emails

An application that restricts a user from using part or all of a device, unless the user pays a fee to the hijacker to unlock the system.

Illegitimate emails used to distribute malicious applications that allow cybercriminals to access a users’ private information, accounts or device(s).

Understanding the threats and how they can access your systems is the first step in protecting your organisation. Click here for steps to protect your organisation.

Contact our experts

Other articles


Top of Page


Rob Southwell

Rob Southwell's picture


Managing Partner and Partner – Private Business and Family Advisory

> View profile

Nigel Fischer

Nigel Fischer's picture


Managing Partner - Private Business and Family Advisory

> View profile

Michael Minter

Michael Minter's picture


Managing Partner

> View profile

Leon Mok

Leon Mok's picture


Managing Director

> View profile

Brendan Britten

Brendan Britten's picture


Managing Partner and Executive Director/Partner- Business Advisory and Assurance

> View profile

Ben Brazier

Ben Brazier's picture


Managing Principal

> View profile

Partnership fraud


Paperwork and independent advice saves partnerships from fraud

Discover more

Kia Ora Horse Stud


Pitcher Partners fills a Financial Manager gap to keep the business on track

Discover more

Fuel Injection Company Administration


A fuel injection company began life as an Australian public company before being acquired by a UK publicly listed company while in the research and development stage of a “green...

Discover more

@PitcherPartner LEADERSHIP | Client care is more important than ever as businesses & individuals navigate these challenging times.… https://t.co/G5Bw6ZfczG