1. WE RESPECT YOUR PRIVACY Seccom Global Pty Ltd respects your right to privacy and this policy describes how we collect and treat your personal information. “Personal information” is information we hold which is identifiable as being about you. 2. WHAT PERSONAL INFORMATION WE COLLECT We may col...
We have seen a significant increase in Ransomware attacks over the past 24 months – and there looks to be no slowing down! These attacks can be devastating to businesses and while the best remedy is prevention, it pays to understand exactly how these attacks occur, and what action to take when the...
This week is Privacy Awareness Week – a global initiative, supported by the Australian Information & Privacy Commission.While most Australian Businesses are very aware that they need to protect sensitive data, some are still struggling to put the correct measures in place to do this effec...
Australia, August, 2020 – Seccom Global today announced that it has been appointed as an MSSP focus partner by Check Point Software Technologies, a leading provider of cyber security solutions to governments and corporate enterprises globally. This partnership will enable Seccom Global to del...
Since WANNACRY AND NotPetya, security researchers have heavily scrutinised new Windows bugs that could be potentially be used to create a similar worm. One potentially wormable vulnerability has appeared in Microsoft’s Windows DNS Server. Check Point’s Research Team discovered a new vulnerabilit...
There is no shortage of information written on artificial intelligence (AI) and machine learning – in fact, the volume of information circulating at present is almost overwhelming! Besides, much of what is available is either overly complex or too high level to give an adequate understanding. AI i...
The Surface Web, Deep Web and Dark Web all make up what we know to be the Internet. The Surface Web is the area of the Internet that we are more familiar. It is the area of the Internet that can be indexed by search engines such as Google, Bing and Yahoo. The Deep Web […]...
The Morrison Government today raised the issue of state sponsored attacks against Australian companies and critical infrastructure and immediately the Seccom Global phones started ringing. Unfortunately, this is not new, it has been happening for many years, but it seems it takes a national announce...
Social engineering is the manipulation of someone to serve an objective such as divulging confidential information tThe Cyber Kill Chain framework developed by Lockheed Martin was developed to identify what an adversary must complete in order to conduct a Cyberattack. By stopping an attack at any st...
Social engineering is the manipulation of someone to serve an objective such as divulging confidential information that they would not normally divulge. Victim triggered exploits such as opening a malicious email or clicking on a malicious link are still the main entry point for an assailant to gain...