Cyber Security News & Current Events

by Jill T, on 13/04/2022 4:57:04 PM

It's that time of year when the team over at Mimecast releases their much-anticipated State of Email Security report. Covering data that spans the entirety of 2021, the report surveyed 1400 …

Read Story
Topics:Risk AssessmentPhishingRansomwareReport Roundup

by Security Centric, on 24/03/2022 8:48:01 AM

News came to light recently from a threat actor group that authentication provider Okta had been compromised by one of their members. Okta later confirmed this, saying that an account …

Read Story
Topics:Threat Advisory

by Alex W, on 22/03/2022 9:55:37 AM

As security teams assess the key vulnerabilities of their IT infrastructures, growing attention is being placed on cyber supply chains. Attacks, such as the high-profile SolarWinds incident, occur when cybercriminals …

Read Story
Topics:Risk AssessmentComplianceEssential Eight

by Security Centric, on 03/03/2022 10:25:00 AM

Security Centric has announced the appointment of Sameh Girgis as Senior Security Consultant. Based in Sydney, Girgis will be responsible for reinforcing and propelling the company’s consulting and managed security …

Read Story
Topics:GovernanceManaged ServicesSecurity Centric

by Jill T, on 22/02/2022 2:30:27 PM

If you're not yet familiar with the ISO 27001 standard, it's an internationally recognised certification standard specifically focused on information security. Using the policies and procedures outlined in the standard …

Read Story
Topics:Risk AssessmentComplianceGovernance

by Jill T, on 17/01/2022 4:09:40 PM

Organisational risk covers a lot of bases within a business, from issues such as staff shortages and regulatory changes through to global pandemics and cyber threats. Knowing what to focus …

Read Story
Topics:Risk Assessmentrisk profileReport Roundup

by Security Centric, on 06/01/2022 12:15:00 PM

Last month Security Centric principal consultant Sash Vasilevski provided his expertise to Business IT, outlining recommendations for cybersecurity uplift measures for small to medium enterprises. Throughout the article, an outline …

Read Story

by Security Centric, on 04/01/2022 12:15:00 PM

In the many years that Security Centric has been partnering with organisations to provide services ranging from compliance, penetration testing, and security engineering through to managed security services such as …

Read Story

by Security Centric, on 30/12/2021 1:00:00 PM

With the IT security landscape constantly evolving, many businesses struggle to find and retain people with the knowledge and skills required to counter threats. Last month, Security Centric's Sash Vasilevski …

Read Story
Topics:FundamentalsfeaturedManaged Services

by Security Centric, on 28/12/2021 11:17:00 AM

Earlier this month Security Centric's Sash Vasilevski provided expert opinion to the team at iTWire on the ins and outs of implementing zero trust as an outcome of the ongoing …

Read Story
Topics:Risk Assessment

by Sash, on 22/12/2021 9:13:10 AM

2021 has been challenging for the team at Security Centric, as it has for everyone, hopping in and out of lockdowns, an increasing workload and new team members. As we …

Read Story
Topics:Security Centric

by Security Centric, on 11/12/2021 3:25:30 PM

A new remote code execution vulnerability has been discovered affecting a common software library used in many systems and applications. A Java library, log4j2, is widely used in embedded systems …

Read Story
Topics:Threat Advisory

by Jill T, on 10/09/2021 1:18:32 PM

A new troubling remote code execution vulnerability has been discovered that affects customers using Office 365 and Office 2019 on Windows 10 and is already being exploited by malicious actors …

Read Story
Topics:Threat Advisory

by Jill T, on 18/08/2021 4:01:02 PM

If you were to ask us what the main cybersecurity mistakes organisations routinely make were, the one where businesses rely on their everyday IT team or providers to also perform …

Read Story
Topics:ComplianceRansomwaremanaged security services

by Jill T, on 22/06/2021 11:18:46 AM

The fact that ransomware is continuing to be a prolific threat probably isn’t news to those of you in the world of cybersecurity – however we know that most organisations …

Read Story
Topics:ComplianceRansomwareregulations

by Jill T, on 10/06/2021 5:06:25 PM

It’s always a great day for someone who loves reading reports when the annual Verizon Data Breach Investigation Report (DBIR) gets released. However, we know not everyone enjoys reading 119 …

Read Story
Topics:data breachVerizon DBIRReport Roundup

by Jill T, on 02/02/2021 10:36:23 AM

As most companies come fully back into the office from the holiday period and Australia adjusts into a “COVID normal” routine, many organisations are in a place to plan strategy …

Read Story
Topics:FundamentalsRisk AssessmentPhishingCompliancePenetration TestSecure Remote WorkGovernance

by Security Centric, on 22/12/2020 11:35:07 AM

There's no doubt that 2020 has created some unique challenges across every organisation, and since information security touches on arguably each of them, it also created some challenges for cyber …

Read Story
Topics:featured

by Jill T, on 08/12/2020 9:43:01 AM

Like all areas of business this year, it’s important for organisations to get up-to-date information about the current state of ongoing cyber threats in the wake of changes due to …

Read Story
Topics:Ransomware

by Jill T, on 05/11/2020 1:11:42 PM

By now we’re all aware that COVID-19 has changed the way we work. Organisations have had to adjust their ICT environments to accommodate the mandated work-from-home requirements, and these adjustments …

Read Story
Topics:Risk AssessmentPenetration TestCloud SecuritySecure Remote WorkGovernance
Content not found

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe to Updates