Cybersecurity

The following article provides you with a breakdown of the worst malware of 2021. What is Malware? Malware, short for malicious software, is an intrusive software that is designed and created by cybercriminals to steal, damage and destroy computers and computer systems. The common terms you see and hear often such as, worms, Trojan viruses, […]

cyber, attack, encryption-5338472.jpg

  Elastic was recognised in the 2021 Gartner Magic Quadrant for SIEM. The industry’s best made better for you at CommuniCloud. Our Managed Services are built on Elastic. Powered by AgileBlue our ELK stack (Elastic, Logstash and Kibana) provides the foundation for our machine learning technology. That means our platform can learn your company’s definition

cyber, artificial intelligence, brain-4062449.jpg

With Cyberattacks are on the rise, it’s time to reflect on some of the biggest cyberattacks in history. In particular, it’s important to consider the evolution and sophistication of attacks. As we head into 2022, we would like to cover some of the monumental cyberattacks that helped shape the current state of cybersecurity. The following

hack, hacker, hacking-5332845.jpg

According to the Australian Cyber Security Centre, over the 2020–21 financial year, the there was an increase in reporting of cyber attacks to reporting of a cyber attack every 8 minutes compared to one every 10 minutes last financial year. These incidents are increasingly on the rise and with many Australians using only 5 or

eye, iris, biometrics-2771174.jpg

Ava Reveal allows your organisation to monitor, analyse, and understand activity across your users and endpoints. Reveal helps your security team prevent data leaks and loss, detect threats, and train employees on cyber hygiene and compliance requirements. The Reveal Agent is responsible for collecting information, hosting policies, and taking actions when commanded by the operator directly or when triggered by

Cybersecurity is continuously evolving. The nature of cyber threats one month can be completely different from the threats that pop-up the following month. As IT teams struggle to keep up with the constant cyber threats, gaps can start to form within their organisational structure. While this can be concerning for IT teams, there are several

Identify and Track Risky Employees Insider threats can come from different parts of your organisation or the supply chain. They can emerge from different users, like departing employees, home workers, contractors and business partners, or suppliers. Ava Reveal allows you to identify insiders who put your data at risk, knowingly or unknowingly regardless of which

Campbell, Conroy & O’Neill represents Fortune 500 and Global 500 companies. On February 27, 2021, law firm Campbell, Conroy & O’Neill learned of a widespread ransomware attack that affected the personal data of a number of their clients. Campbell serves well-known organizations across a variety of industries including Boeing, Pfizer, General Motors, and Home Depot.

A top concern for companies of all sizes recently has been data breaches as cyber criminals gain power from high ransom payments. Data breaches occur when a third party gains unauthorised access to sensitive information and either sells it on the dark web or holds it for ransom. It’s important for companies to be familiar

Did you know 90% of cyber attacks are targeted at people? With one cyber crime incident reported every ten minutes, Australia is currently one of the world’s most vulnerable countries to cyber attacks. This is a risk you cannot afford to ignore. Like it or not, your workforce is still the primary attack vector for