Blogs By this
author
- Embracing the Modern Workplace
- Unlock Business Agility with Outsourced IT Services
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- AWS Migration Competency – recognition of Comunet’s leadership and expertise in cloud migration services
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- The Software Development Life Cycle
- What is a Business Analyst and what do they do?
- Christmas Cyber Security Tips
- Off the Shelf vs Custom Software – 7 Things to Consider
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Comunet and AWS – delivering secure, scalable and trustworthy services non-profits
Related blogs
to this blog
- What is ISO 27001 Certification?
- Protect Your Business: The Essential Eight and Beyond
- An Overview of ISO 27001:2022
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- How to Protect Yourself Against Ransomware Attacks
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- Christmas Cyber Security Tips
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Passwords are not enough – why you need Multi Factor Authentication
- Building innovation culture
- Getting out of the swamp: Accelerated Data Lake on AWS
Reports from experts this month tell a grim tale that many businesses are failing to recognise the magnitude of the need for cyber risk management. Without adequate protection, preparation, and regular auditing, there is no guarantee of recovery after a major cyber attack. It is often too late when the attack has already happened. Our attackers are evolving much faster than our attitudes and this needs to change.
MinterEllison, Australia’s largest law firm, have released their seventh annual Perspectives on Cyber Risk report this month, surveying “executive, legal and IT personnel across almost all sectors of the Australian economy” and includes easy to digest information on the current overall state of cyber risk management.
This report, as it has in previous years, highlights that user education and awareness at every level of the organisation is critical to the overall security posture of your company – remembering that this includes executives, board members, and any other party involved in the overall future planning and decision making.
One key takeaway was that only 56% of respondents surveyed said that cyber security was considered “high risk (top five)” on their organisation’s risk register and less than 50% have taken any steps to assess their cyber maturity against any established frameworks.
Ms. Abigail Bradshaw CSC, Head of the Australian Cyber Security Centre, is quoted saying “In FY 2020-21, many of the compromises experienced by Australian organisations could have been mitigated by taking simple steps to protect systems.”
If you or your business have any questions, queries, or doubts about your Cyber Risk Management, please feel free to get in touch.