JamCyber...

Blog

Major Cyber Attack

Over the past few months, we have been focusing our attention on cybersecurity to ensure our clients are protected. The recent announcement by the Morrison government highlights how important cybersecurity is for Australian businesses. On Friday, Prime Minister Scott Morrison announced that governments and businesses, were being targeted by a sophisticated foreign “state-based” hacker.  In […]

Read more

Advisory 2020-008

The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’ Specifically, it recommends businesses prioritises the following mitigation strategies: Prompt patching of internet-facing software, […]

Read more

ACSC Essential 8

In response to the current cyber-attack on Australian Government and businesses, the ACSC has recommended all businesses prioritize implementing application and operating system patching and multi-factor authentication. Find out more about how to implement these cybersecurity strategies for your business: https://jamcyber.com/cyber-security/acsc-essential-8

Read more

Cybersecurity and the other 99.8%

‘2 out of 3 respondents (66%) believe a cyberattack is unlikely, even though in reality 67% of Small to Medium Business experienced a cyberattack in the last year’. Keeper Security’s 2019 SMB Cyberthreat Study SME owners are told that they have enough protection via antivirus software.[1] They feel that they are ‘too small’ to warrant anyone wanting […]

Read more

How many is too many passwords?

Insecure password practices are exploited in 81% of cyber-attacks worldwide, and 61% of all attacks target businesses with less than 1,000 employees.[i] Whilst password hacking has always been one of the favourite techniques of cyber-criminals, today there are more opportunities for hackers than ever before. This is due partly to the growth in cloud-based applications […]

Read more
Have questions? Search our knowledgebase.