Two Innovative Ways to Combat Ransomware We all know the seven traditional steps to fight ransomware, but are they still holding up?
Security Emerging Ransomware Trends in 2022 The new year brings new operating models, highly targeted attacks, and additional battlegrounds into the ransomware business.
Security 3 Cyber Security Tips for Small Business Owners How to keep your small business secure from cyber attacks? With the following three simple measures, you can quickly improve the risk profile of your company.
Security 4 Business Benefits of Professional Email Services for SMBs How can your business benefit from Office 365 and G Suite? Here's how to get more things done with the free add-ons, and protect your business with the security features.
Technology 5 Benefits of Managed Email Hosting Services for Small Business In a competitive environment, it is essential to maintain a professional image to your customers, suppliers, and even to your competition. Our latest article features the main benefits of having an IT provider manage your email service.
Technology The 4 Deadly Technology Sins of a Small Business Why is it so that SMBs are so vulnerable to technology issues? We explain what the leading IT and cybersecurity risks of any small business are, and how a managed IT services provider can help business owners address them.
Technology 5 Reasons Why Your Small Business Should Outsource IT IT outsourcing is an ever-increasing practice within the professional services sector. If your business is spending too much on managing email accounts, servers, printers, and telephones, it is time to consider getting external help from the professionals.
Security Owning Your Legal Practice's Cybersecurity – MSPs and You Law practices should be aware of the cyber risks associated with IT, as a security breach involve financial and reputational damages, and legal liabilities. Read what the six questions are that every legal professional should ask from their managed IT services provider to avoid a data breach.
Training How to Run Effective Security Awareness Training for your Organisation Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we reveal the techniques we find useful in our training sessions.
Security Preventing Business Email Compromise Fraud at Your Business What can business owners do to protect their organisation from Business Email Compromise fraud? Download our slide deck from the ISACA event to find it out.
Phishing What Phishing Campaigns Have in Common with the Cocos Islands? Phishing is one of the main reasons why Australian businesses are getting hacked. What has an exotic paradise in the middle of the Indian Ocean to do with cyber crime? Iron Bastion experts explain how Cocos (Keeling) Islands enables criminals to defraud organisations and individuals worldwide.
Security Your Definitive Guide to Information Security Conferences in 2019 Are you a hacker or an information security professional looking for conferences down under? Our non-comprehensive list features the major cyber events Australia has to offer in 2019.
Security Phishing Is the Top Reason Behind Australian Data Breaches The latest Notifiable Data Breaches Quarterly Statistics Report confirms that Australian legal practices are at risk of cybercrime with phishing as the main threat.
Security Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide) This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments.
Security Discovering Hidden Email Gateways with OSINT Techniques In this article, we elaborate how we managed to identify hidden internal email servers by relying on various open-source intelligence (OSINT) data sources for our direct email spool attack research.
Security How to Evade Expensive Phishing Filters with One Simple Trick One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime.
Phishing Five Ways to Identify Phishing Emails As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
Security Why multi-factor authentication on the PEXA platform leaves security concerns? PEXA introduces multi-factor authentication to combat payment redirection fraud but leaves security concerns due to SIM swapping attacks.
Conveyancing ARNECC, ELN, ELNO, ECNL, PEXA – The Alphabet of Electronic Conveyancing In this article, we explain the basics of electronic conveyancing and what cybersecurity challenges other conveyancing platforms were facing overseas.
Security Hacking Law Firms with Abandoned Domain Names This research report demonstrates how domain name abandonment poses a significant cyber threat to the legal profession and other businesses. This report also makes recommendations as to measures legal practices and other businesses can take to stop this threat.
Security Why You Need Professional Email Hosting for Your Business In this article, we explain how basic email hosting providers can put your business at risk of cyber attacks and why you should consider migrating to a professional email service.
Conveyancing Our Slides from the AIC NSW Cyber Security Seminar We were honoured to be invited to the AIC NSW Cyber Security Seminar last week. On this two-hour session, the audience had the opportunity to look at the recent cases of cyber fraud against conveyancing practices, and what steps they can take to guard against being affected.
Conveyancing Is Your Conveyancing Practice Secure From Hacking? The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack know as phishing to help commit payment redirection fraud.
Conveyancing How To Prevent Payment Redirection Fraud At Your Conveyancing Practice Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts.
Conveyancing Is the Cybersecurity of Your Conveyancing Business PEXA Ready? Iron Bastion is publishing a simple questionnaire today to allow conveyancing and legal practices to assess their cybersecurity posture and therefore their ability to use the e-conveyancing platform safely and securely.