Training How to Run Effective Security Awareness Training for your Organisation Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we reveal the techniques we find useful in our training sessions.
Security Phishing Is the Top Reason Behind Australian Data Breaches The latest Notifiable Data Breaches Quarterly Statistics Report confirms that Australian legal practices are at risk of cybercrime with phishing as the main threat.
Security Setting Up an Email Server for the Direct Email Spooling Attack (How-to Guide) This how-to guide aims to demonstrate how easy it is to circumvent expensive email security solutions with simple open-source tools. Email administrators can also follow this guide to build their email delivery service for email direct spool attack security assessments.
Security Discovering Hidden Email Gateways with OSINT Techniques In this article, we elaborate how we managed to identify hidden internal email servers by relying on various open-source intelligence (OSINT) data sources for our direct email spool attack research.
Security How to Evade Expensive Phishing Filters with One Simple Trick One in three Australian law firms are susceptible to a cyber threat called “direct email spool attack”, our report can reveal. This attack technique bypasses expensive email security solutions, rendering them completely useless and exposing the affected organisations to cybercrime.
Phishing Five Ways to Identify Phishing Emails As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
Security How Abandoned Domain Names Pose a Major Cyber Risk to Your Business Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
Security Why You Need Professional Email Hosting for Your Business In this article, we explain how basic email hosting providers can put your business at risk of cyber attacks and why you should consider migrating to a professional email service.
Conveyancing Our Slides from the AIC NSW Cyber Security Seminar We were honoured to be invited to the AIC NSW Cyber Security Seminar last week. On this two-hour session, the audience had the opportunity to look at the recent cases of cyber fraud against conveyancing practices, and what steps they can take to guard against being affected.
Conveyancing Is Your Conveyancing Practice Secure From Hacking? The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack know as phishing to help commit payment redirection fraud.
Conveyancing How To Prevent Payment Redirection Fraud At Your Conveyancing Practice Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts.
Conveyancing Is the Cybersecurity of Your Conveyancing Business PEXA Ready? Iron Bastion is publishing a simple questionnaire today to allow conveyancing and legal practices to assess their cybersecurity posture and therefore their ability to use the e-conveyancing platform safely and securely.
Conveyancing Cybersecurity Tips for Conveyancers and Solicitors using PEXA A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the PEXA platform at settlement recently. We explain the most likely way the fraud occurred and what practical things you can do today to protect your business from payment redirection fraud.
Security Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business A major cyber threat to businesses like yours is impersonation scams. The scheme usually involves cybercriminals mimicking business owners and executives through the use of phishing emails. The good news is that your IT staff can take some measures protect your business, and here is how.
Phishing Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2) High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. We showcase a range of real-world phishing emails caught by our anti-phishing technology, which would have otherwise ended up in our clients' inboxes.
Phishing Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1) As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you or your business from becoming a phishing victim.
Security How you can protect your Microsoft Exchange email service from cyber attacks Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?