The Armoury - August 2024

The Armoury - August 2024

Welcome to The Armoury

Cyber threats are getting sophisticated, and the number and style of threats are on the rise. We understand that your schedule is packed, but staying informed about cybersecurity is a top priority. With The Armoury, we've curated the most relevant and important content from trusted sources. Our team handpicks articles, news items, and tips that you need to know, saving you time and effort while ensuring you have the knowledge to protect yourself and your organisation.

If you ever decide that The Armoury no longer aligns with your needs, you can easily unsubscribe at any time.

Stay safe.


Latest Cybersecurity News

  • ACMA Directs SMSGlobal to Address Anti-Scam Violations. The Australian Communications and Media Authority (ACMA) has instructed SMSGlobal to adhere to anti-scam regulations following breaches of the Reducing Scam Calls and Scam SMs Industry Code. ACMA's investigation revealed SMSGlobal allowed over a million SMS with misleading headers, enabling scams that impersonated brands like AusPost, NAB, and ANZ. The company also failed to report scam data promptly. Under the code, telcos must monitor, disrupt scams, and cooperate with other agencies to protect consumers. Non-compliance may result in penalties of up to AUD250,000. Source: The Record News
  • New Cybersecurity Law Aims to Curb Ransom Payments in Australia. The Australian government is advancing a new Cyber Security Act aimed at enhancing transparency around ransom payments. The law will mandate that businesses and government bodies disclose any ransom payments, with penalties for non-compliance. This shift comes after a surge in ransomware attacks on high-profile companies and growing concerns over unreported payments. Critics argue the rules could disproportionately impact small businesses, but the government has introduced safeguards to protect them. The legislation is part of a broader strategy to improve cybersecurity and transparency in response to escalating cyber threats. Source: ABC News
  • Global Cybersecurity Agencies Release Guide on Event Logging and Threat Detection. The Australian Cyber Security Centre (ACSC), in collaboration with international agencies including CISA, FBI, and NSA, has released a 17-page best practice guide titled "Best Practices for Event Logging and Threat Detection." The guide sets a baseline for effective event logging to combat cyber threats, advising IT and operational technology professionals on centralised log collection, secure storage, and detecting malicious activity. It emphasises strategies for identifying living-off-the-land techniques and ensuring event log integrity.? Source: CyberDaily


Cybersecurity Tips & Best Practices

  • Regularly Rotate Encryption Keys: Frequently update cryptographic keys to enhance data security and minimise the impact of a potential key compromise.
  • Enforce Least Privilege on Admin Accounts: Regularly review and minimise the number of users with administrative privileges to reduce risk.
  • Leverage Artificial Intelligence for Anomaly Detection: Implement AI-driven tools that can identify unusual patterns and potential threats faster than manual system


Cybersecurity awareness & education

Did you know?

The infamous “Heartbleed” bug, discovered in 2014, was a vulnerability in the OpenSSL cryptographic library, which is used to secure internet communications. It allowed attackers to read sensitive data from the memory of affected servers, including private keys and user passwords, potentially compromising secure transactions and communications. Heartbleed affected around 17% of the internet’s secure web servers at the time.


Cybersecurity FAQ

What Are the Different Types of Firewalls?

Firewalls are essential for protecting your network from unauthorised access and cyber threats. Different types of firewalls offer varying levels of security and functionality to meet diverse needs. Here’s a brief overview of the main types of firewalls and their roles in safeguarding your network.

  • Packet-Filtering Firewalls: Checks each data packet against rules to decide if it should be allowed or blocked. Provides basic protection for simple networks by filtering out unwanted or harmful traffic.
  • Stateful Inspection Firewalls: Monitors active connections and ensures that data packets are part of an established session. Offers more security than packet-filtering by keeping track of ongoing connections, making it suitable for most networks.
  • Proxy Firewalls: Acts as a gatekeeper between your network and the internet, hiding your internal IP address. Adds an extra layer of security and controls access to websites and applications.
  • Next-Generation Firewalls (NGFWs): Combines traditional firewall features with advanced tools like intrusion prevention and deep packet inspection. Provides advanced protection for complex networks, offering detailed control and threat detection.
  • ·Unified Threat Management (UTM) Firewalls: Integrates multiple security features, such as firewall, antivirus, and content filtering, into one device. Simplifies security management by providing an all-in-one solution, ideal for small to medium-sized businesses.
  • Application Layer Firewalls: Filters data specific to applications like web traffic to prevent attacks targeting those apps. Protects specific applications and services from targeted attacks, ensuring they run securely.
  • Cloud Firewalls: Protects cloud-based services and data, either through software or integrated into cloud platforms. Provides scalable and flexible protection for data and applications in cloud environments.


Cybersecurity Events

Event: Cyber Security Summit Australia

Date: 19 September 2024

Location: ?Sydney, Australia

Register Here

?

Event: CRESTCon Australia

Date: 26 September 2024

Location: ?Realm Hotel, 18 National Circuit, Barton, Canberra 2603 Australia

Register Here


Cybersecurity Trivia of the Month

The first known computer password was used in 1961 by MIT's Compatible Time-Sharing System (CTSS). It allowed multiple users to access the same computer system while keeping their work separate and secure.


Recent Ransomware Breach

Meli Under Cyber Attack: Ransomware Group Claims Massive Data Theft

Meli, a North Geelong-based community support service, has confirmed a cyber-attack and is investigating the incident. The Qilin ransomware group claimed responsibility, listing Meli on its darknet site and alleging the theft of 419,617 files totalling 215 gigabytes. The stolen data includes financial statements, passports, and a Medicare card. While client services remain unaffected, some internal processes have reverted to manual methods. Meli is working with forensic experts and has notified Victoria Police, Victoria Health, and the Australian Cyber Security Centre. The organisation emphasised the need for thorough investigation before providing further details.


Cybersecurity Meme of the Month




Sign up for The Armoury

Sign up for our The Armoury to get the latest updates on Cybersecurity first-hand via email.


#itbusiness #technology #cybersecurity #cybersecuritytips #cybersecurityupdates #innovation

?

Tasia Valenza

EMMY winning voiceover artist ?? TEDx speaker. My passion is to "Givegreatvoice" to elevate your brand, tell your story, and captivate your audience!

3 个月

Thank you for sharing ?? !

Paris Cutler

Award-winning Entrepreneur, Consultant & Leadership Specialist | Transforming Teams & Leaders with Proven Strategies for Success

3 个月

Thanks for sharing, Mani Padisetti! Always value the wisdom you bring to the table.?

Edward Zia

I LOVE LinkedIn & Microsoft ?? LinkedIn Certified Consultant ?????? Meetup & Business Networking Leader ?? Speaker ?? Master Influencer & Sales Coach & Mentor ???? Teachable Creator ?? Veteran ?? Christian ??Lassie Zia

3 个月

Mani Padisetti brilliant technology tips

Belinda Paris

I GIVE ambitious executives CLARITY in their CAREER to land their DREAM role without MONTHS of applying | Resume Writer | Career Coach | LinkedIn Top Voice | Message me 'CLARITY' to find out how I can help YOU!!

3 个月

?This issue looks packed with essential insights, Mani Padisetti!

Justine Bate

Program Manager & Consultant | Emerging Tech Armoury

3 个月

This is very informative Mani Padisetti!

要查看或添加评论,请登录

社区洞察

其他会员也浏览了