Categories

OT security: what is it and should we be worried?

Barely a day goes by without some form of cyber attack hitting the headlines – no small feat in a time of a deadly global pandemic.   While the majority of attacks have targeted organisations’ IT processes, experts agree it’s only a matter of time before hackers set their sights on the operational technology (OT)… Continue reading OT security: what is it and should we be worried?

How to improve your OT cyber security maturity

With daily reports of OT security breaches and imminent changes to local legislation, it has never been more important for businesses to review their security settings. This can seem overwhelming, but no matter what your business’s size, it should be guided by three basic questions.    What is your baseline security level? Every organisation, big… Continue reading How to improve your OT cyber security maturity

Would you risk it for a brisket?

Cyber security has become a hot topic across the world and an area that governments are paying more attention to, particularly around critical infrastructure. Every day, people across the globe wake up to the news of a new cyberattack, often in the form of crippling ransomware that encrypts files and locks users out of systems… Continue reading Would you risk it for a brisket?

New critical infrastructure laws: What you need to know

Last year saw a huge upheaval for businesses as they were forced to rapidly reimagine their operating systems and workforce engagement in response to Covid-19.   And while vaccination rollouts provide some prospect of a return to “normality”, businesses must now prepare for the next big change – complying with the federal government’s new Security… Continue reading New critical infrastructure laws: What you need to know

IoT/OT Defence: Removing The Myth Pragmatically

The threat posed by state-sponsored threat actors on critical infrastructure has been a heated topic of discussion since 2010 and again this week the ACSC raised further concerns. While a lot of attention has been given to the malware and tactics used by advanced persistent threat groups, and rightfully so as it enables better defence… Continue reading IoT/OT Defence: Removing The Myth Pragmatically