Cyber Security Awareness Options

In case you’ve been living under a rock, cyber warfare is on the rise, and the consequences to businesses and individuals can be devastating. At best it will cost you a lot of money, at worst it will cost everyone their jobs, so companies are starting to wake up to the fact that something needs to be done, and that’s a good thing!

The Cyber Security Breach Life-Cycle

When it comes to Cyber Security, most companies unfortunately remain oblivious or ignorant to the threats they are faced with on a day to day basis. This document will explain the typical cyber security breach lifecycle, what the implications are, and what you can do about it.

Online Vs Face to Face Training

If you've had a look through this website, you'd know that I focus on face to face Cyber Security Training, and there are some really good reasons for that. Sure I restrict myself geographically, but there are plenty of businesses in Brisbane and the surrounding area, and I can do FIFO as well. So there's no shortage of work, especially in my niche!

Conversations with a Scammer

Below is a transcript of my conversations with a real scammer who contacted me anonymously via LinkedIn. I tried to see how much fun I could have with this, and how long I could keep the communication going for. I will continue to add to this as the conversation continues.

Watching You Watching Porn

eyeball webcamI'm going to link to this one over on LinkedIn Pulse, because frankly it may damage my website search engine results!

In the fight against hackers, you must use your staff!

This is an article I wrote for Go1 as a guest blogger.

My Interview with "The Art of Service"

This is my interview with Ivanka Menken from "the Art of Service" (a provider of IT training materials, We discussed cyber security staff awareness training in the context of cyber security risk management, and the full interview can be found here:

When Cyber Security Tech Becomes Dangerous

So this is an interesting discussion topic that popped up the other day. I was discussing cyber security awareness with an IT support provider, and we started talking about their terminal services solution involving Citrix and AppLocker. So basically they white-list what can / can't run in the session, therefore effectively preventing malicious software from executing. And that's great for the client, no doubt!

Compliance Does Not Equal Security

I see this a lot - companies doing a short 1/2 hour online cyber security awareness course. They tick the box that their compliance is done, and that their staff are cyber security aware. When I ask the staff from companies like these how the course was, they can't really remember much about it.

What Can I Do to Keep My Data Safe Online?

Hacked...... private information leaked. Hacked..... private information leaked. It's a never ending headline, and it will continue to be a never ending headline, because information is worth money. It's that simple. And the more valuable your information, the more of a target it becomes.

There's a War Going On

It's a known fact that about 91% of all cyber crime is initiated by email. Essentially this is a war being fought between hackers, and your staff.

How do staff feel about going to war? Heck they don't usually know they're in it! They think that IT has got it covered with their fancy hardware and software - it's not their job to look after IT security right? But actually, it is their job now, or at least it should be. They are at the front line, and they must have the proper skills to wage a successful defense!

How to Steal a Car

Weird thing happened today - I worked out how to steal cars. Expensive ones. And you can just get someone to hand you the keys and drive away with it no questions asked. Not that I'm into that sort of thing though.

Disclaimer: Please don't steal cars.

"A blind person with a taser just shot my forklift driver!"

Scenario 1

"Hi Bob, welcome to the warehouse. How's your first day going?"
"Yeah great. So what do you want me to do?"
"Well I guess we'll start you on the forklift."
"Um, ok sure."
"So you've driven things with wheels before?"
"Yep, I'm good to go!"

Actual Cyber Breach Costs: Small Business Case Study

1. Background

This information is compiled from a company that WebSafeStaff trained for Staff Cyber Security Awareness. By working with them to analyse their monthly IT invoices, the following information and conclusions were able to be extracted.

Get in Touch

Contact Details