JamCyber...

Blog

Cyber CEO – Application Whitelisting

Cyber CEO – Application Whitelisting Cyber CEO Short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What is Application Whitelisting?" You may also be interested in: What is Ransomware? What is Application Hardening? What are Administrative Privileges? What is Multifactor Authentication? What are Man-in-the-Middle Attacks? Check [...]
Read more

Cyber CEO – Ransomware

Cyber CEO – Ransomware Cyber CEO Short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What is Ransomware?" You may also be interested in: What is Application Whitelisting? What is Application Hardening? What are Administrative Privileges? What is Multifactor Authentication? What are Man-in-the-Middle Attacks? Check out [...]
Read more

Cyber CEO – Application Hardening

Cyber CEO – Application Hardening Cyber CEO Short videos explaining things around cyber threats and cyber security for small and medium business. This session asks "What is Application Hardening?" You may also be interested in: What is Ransomware? What is Application Whitelisting? What is Multifactor Authentication? What are Administrative Privileges? What are Man-in-the-Middle Attacks? Check [...]
Read more

Major Cyber Attack

Over the past few months, we have been focusing our attention on cybersecurity to ensure our clients are protected. The recent announcement by the Morrison government highlights how important cybersecurity is for Australian businesses. On Friday, Prime Minister Scott Morrison announced that governments and businesses, were being targeted by a sophisticated foreign “state-based” hacker.  In […]

Read more

Advisory 2020-008

The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website that ‘it is imperative that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks.’ Specifically, it recommends businesses prioritises the following mitigation strategies: Prompt patching of internet-facing software, […]

Read more

ACSC Essential 8

In response to the current cyber-attack on Australian Government and businesses, the ACSC has recommended all businesses prioritize implementing application and operating system patching and multi-factor authentication. Find out more about how to implement these cybersecurity strategies for your business: https://jamcyber.com/cyber-security/acsc-essential-8

Read more
Have questions? Search our knowledgebase.