Comunet Blog

At Comunet, we love technology.  More than that, we love helping clients use technology to build their businesses.   

For over 20 years we have been helping our clients define, design and implement IT strategies that suit their business needs - from small through to enterprise-sized organisations.  With expertise across all areas of IT including strategic consulting, cloud technology, software and application development as well as infrastructure  and managed services - we aim to help clients on a digital transformation journey that aligns to their strategic needs

Based in Adelaide, let us help your business stay ahead of the competition by giving you access to world class, best of breed technology providers - all delivered locally.

Cybersecurity Threats – What You Need to Watch Out for in 2017

Mar 24 2017


We have spoken previously about how Comunet can help your organisation against the threat of cybercrime. In this blog post, we wanted to go into more detail about some of the threats that your team members should be aware of. As we often advise our clients, the end user is often the last line of defence in an organisation’s cybersecurity program. By helping your team members understand the threats that exist, you can ensure that this last line remains strong. Here are some of the key threats that your organisation should be on the lookout for.


Ransomware is a form of malicious software (malware) that prevents or limits users from accessing their computer systems. This can be in the form of locking a computer’s screen or locking a user’s files. As the name suggests, cyber criminals who deploy this malware demand a ransom to be paid for the files and/or system to be unlocked. Ransomware can be installed on a computer system from a variety of sources. Usually, this source is a malicious or compromised website, but ransomware can also come in the form of an email attachment. As such, it is vital that organisations have the most up-to-date software in place to ensure that emails are scanned and suspicious websites are blocked. It is also important for team members to be aware that if an email looks suspicious to delete it immediately without clicking on any links or downloading any attachments.

Internet of Things (IoT) Hacks

As businesses embrace more connected devices as part of the growing internet of things (IoT) trend, it is important to emphasise that there could be risks associated with these new workplace tools. As is often the case, IoT devices are always on and always connected. This makes them vulnerable to external attacks. Furthermore, because these connected devices are collecting and storing large quantities of data, it is essential that the necessary protections are in place. If you are planning on adopting IoT devices in your workplace, we would highly encourage you to speak to one of our Security experts at Comunet, who can assist you in deploying the necessary defences so you can enjoy the benefits of the device, while minimising the threat of a data breach.

Mobile Device Breaches

Similar to the internet of things, many organisations are adopting the trend of enterprise mobility management; equipping their staff members with smartphones and tablet computers to improve their productivity. There are great benefits to be gained from a successful mobility program, but is also essential that organisations realise how these initiatives can have vulnerabilities. The concerning trend in cybercrime is that hackers are now targeting employees through their own personal social media and email accounts. These were areas once excluded from corporate cybersecurity programs, but with the increase of employees bringing their own devices (BYOD programs), it is important that organisations have the necessary security protocols in place to ensure that company data is not breached through employees’ personal channels. Enterprise mobility management platforms such as Vmware AirWatch can be used to ensure that employees can operate their own devices without putting company data at risk. In our experience, clients have found that such programs have given them the security they need to withstand these emerging threats.

In conclusion, cybercrime is becoming more important than ever. As we have discussed, some threats have existed for several years while others are emerging as new technologies are developed. In either case, it is vital that organisations have the necessary defences in place to ensure that they can benefit from new innovations, while protecting their systems and information for the future.