Every organisation has the critical responsibility to protect their own corporate data containing sensitive personal information. In doing so, they must also protect the handling of their customer and partner data.
Personal information (PI) is information about an identified person or someone who is reasonably identifiable. Information that is not about an individual on its own may become PI when it is combined with other information resulting in an individual becoming ‘reasonably identifiable’.
A data breach constitutes personal information that an entity holds being subject to unauthorised access or disclosure, or even data loss. It may be caused by malicious action, human error, or a failure in information handling or security systems.
In addition to our cyber security services, that form the security foundation of our managed IT Services, Epic IT provide additional cyber security services such as these below.
speak to our team on 08 9228 2945 and get to work on your cyber security today
According to the Office of the Australian Information Commissioner (OAIC), in Q3 of 2018, over half of data breaches reported were a result of malicious cyber attacks. Results below.
A malicious or criminal attack deliberately crafted to exploit known vulnerabilities for some kind of gain be it financial or other. So unlike human error and system faults, a malicious cyber attack is an intended action to create a data breach situation.
Phishing attacks accounted for over 50% of malicious attacks. Involved users being tricked into disclosing sensitive information such as usernames, passwords and credit card details by cleverly disguised emails posing as trustworthy entities.
Short for “Malicious Software”, malware are small computer programs design to infiltrate your computer system. Malware is a term commonly used to group these programs such as (but not limited to) viruses, spyware, worms, trojans etc.
A form of malware that will block access or threatens information disclosure if a ransom is not paid. Generally associated with the common crypto locker cyber attacks which have become all too common with victims frequently featured in the media.
One of the most common methods to gain access to anything that is password protected such as an email or cloud account by using various combinations of usernames and passwords until successful.
A more modern attack vector relying on human interaction and often involves manipulating and tricking people into breaking normal security practices in order to gain access to systems.
Current or ex-staff member failing to comply with organisation rules and policies. The rogue worker might cause malicious damage such as mass file deletion or corruption to the ICT system.
Human error is when no malicious component is present, and the breach is a direct result of an accidental human mistake from staff, weak processes etc. Some of these breaches may include:
When data containing private information is disclosed to the incorrect recipient by error or incorrect process. Such as unknowingly emailing sensitive PI such as TFN or credit card details.
Common error when emailing large groups of recipients when the blind carbon copy (BCC) is not used, revealing personal email addresses and names to the entire group.
Accidental disclosure by addressing an email or letter containing sensitive PI to the incorrect recipient that is not authorised to view that information.
Human error when data is lost through accidental deletion or data being left in an unauthorised environment for others to see or access.
Our cyber security solutions will mitigate various malicious and human threats, and even cover some aspects of system error. By blocking, alerting or warning both the user and our security team of these threats in real time, your organisation has a much better chance of reducing its risk of data breach.
Our security team fully manages the system, and the customer will receive interactive reporting straight to their device.
Have a chat to our team on .. 08 9228 2945
Like to learn more about our services?
Please let us know what you are chasing and we will respond same day.