Ways Your Business Can Avoid Cybercrime

Cybercrime attacks come in various forms (malware, ransomware etc.). Whilst it’s hard to imagine, cybercrime attacks can happen anytime to any size business. A government report shows that 33% of Australian businesses have experienced some type of cybercrime. This week we’ll discuss some of the best security practices to help evade cybercrime attacks and the […]
Y2K: The Disaster That Never Happened

20 years ago, whilst the whole world was preparing for the new millennium; thousands of computer technicians’ worldwide had been working to reprogram every computer to read 4 digit dates (e.g. 1999) instead of two digit dates (e.g. 99). This week we look back at the Y2K problem and remember the disaster that never happened. […]
This Time Its The Google+ Data Breach

Data breaches are becoming more prevalent. Last week, the Wall Street Journal revealed internal memos about a security vulnerability in which third-party developers could access data from over 500,000 Google+ accounts. This data included usernames, occupation, date of birth, gender and more. Google upholds that no actual information was scraped and that it was only […]
The Consequences of Corporate Data Loss

Data loss can occur at any time to any size organisation and it can be disastrous for your business. Data loss is an event that results in data being compromised, deleted or made inaccessible by a user or malicious software. This is why maintaining backups and security are important in keeping your business running smoothly. […]
Facebook Data Breach: Time to review your digital footprint

It’s been just over a month since the Facebook and Cambridge Analytica data breach was exposed in an article in The Guardian. The article implied personal data had been improperly obtained and used for targeting political advertising in the latest U.S presidential campaign. Whilst this isn’t necessarily a new tactic, the incriminating aspect, in this case, […]
IPv4 Issues and Migration to IPv6

The inevitable is occurring, we are running out of IPv4 addresses, it is now time to seriously consider IPv6 and we must migrate from IPv4 to IPv6. This article addresses and answers some of the more pressing questions regarding IPv4 to IPv6 migration. What is IPv4? IPv4 stands for Internet Protocol Version 4. IPv4 provides […]
Why IT Security Should Be Your Top Priority

As the variety and number of connected devices grow, so does the chance of having it compromised by hackers or malware. 2017 saw major ransomware attacks like WannaCry and NotPetya affect small businesses and individuals alike. These attacks revealed that malware and ransomware are becoming highly sophisticated in nature and vicious in their approach. Consequently, […]
5 Steps to Securing Your Crypto-Assets

Digital Assets such as crypto-currencies are still fairly new, meaning they are highly vulnerable to cyber-attacks and phishing scams. We have outlined five steps to securing your crypto assets and as well as some useful tips. 1. Create a strong password Although this seems like common sense, according to a 2014 poll from Keeper, the three most common passwords […]
5 Common Characteristics of Phishing Emails

Staff guide Spot the characteristics of phishing emails before you click A phishing email is designed to trick you into clicking a link, opening an attachment, or approving a sign-in. For Australian SMBs, one busy moment can lead to account takeover, invoice fraud, or malware. This guide covers the five most common characteristics of phishing […]
Milnsbridge Security Advisory – KRACK (Crack) WPA2 Wi-Fi vulnerability

A serious weakness in the WPA2 protocol, widely implemented as the recommended default security protocol for all Wi-Fi networks, was disclosed publicly yesterday. This advisory seeks to inform you of the vulnerability and advise what steps have been taken by Milnsbridge to address this issue and also to notify you of potential security risks and […]