Cyber Security News

People Patching
Defending the Human Firewall: Understanding People Patching and How to Avoid It
Mar 17, 2024 In the ever-evolving landscape of cybersecurity, a new term has gained traction: people patching. This concept, while not as widely…read morearrow_forward
Combating Doxxing for Professionals, Parents, and Gamers
Mar 07, 2024 In the interconnected realms of professional, parental, and gaming spheres, the digital threat of doxxing looms large, presenting a multifaceted…read morearrow_forward
Online Gaming 4
Protecting Your Children from the Risks of Online Gaming
Feb 27, 2024 In the immersive world of online gaming, where virtual achievements and digital realms offer a respite from reality, lurking dangers pose…read morearrow_forward
Data Breach Time Delays
Why Detecting Data Breaches Takes Time
Feb 06, 2024 In today's digital age, data breaches have become all too common, with news of major companies falling victim to cyberattacks frequently hitting…read morearrow_forward
Credential Stuffing
Stay Secure Online: Your Guide to Outsmarting Credential Stuffing Attacks
Jan 23, 2024 Credential stuffing is a sophisticated cyber attack method where attackers deploy automated tools to test stolen username and password…read morearrow_forward
Pig Butchering
Sidestepping 'Pig Butchering' Traps in the Season of Love
Jan 09, 2024 In recent times, a new scam has emerged from the underbelly of cybercrime, known as 'Pig Butchering'. No, it doesn't involve actual pigs…read morearrow_forward
Dark Web
Discovered Your Email on the Dark Web? Here's Your Next Steps!
Dec 28, 2023 If you suspect that your email address has been reported on the Dark Web or…read morearrow_forward
Christmas Cyber Security
Your Guide to a Cyber-Secure Christmas
Dec 01, 2023 As the holiday season approaches, businesses must be prepared not only for the festive cheer but also for heightened cybersecurity risks.…read morearrow_forward
QR Codes
How to Outsmart QR Code Phishing
Nov 23, 2023 The term 'quishing' might sound cute…read morearrow_forward
how to avoid the 12 scams of Christmas
Avoiding the 12 Scams of Christmas
Nov 15, 2023 Tis the season to be jolly, but unfortunately, it's also the season when cybercriminals are working overtime to steal your holiday cheer.…read morearrow_forward
Mastering Password Hygiene: Your Key to Online Security
Nov 02, 2023 A stolen trove of passwords released on the Dark Web has been analysed, and it reveals a dangerous trend in how Aussies choose their…read morearrow_forward
Passwords rip 1
How to Know If a Website Is Safe For You To Use Your Credit Card
Oct 13, 2023 Imagine this... you're browsing a website that promises great deals, but something feels off. You're not sure if it's a legitimate site or a…read morearrow_forward
Passwords rip
Is This The End Of Passwords?
Oct 08, 2023 You may have seen the term 'passkey' popping up more and more... But what are they and why should you care…read morearrow_forward
Dymocks data breach
Protecting Your Data: Dymocks Data Breach and What You Need to Do
Sep 05, 2023 Dymocks, the book retailer, has alerted its customers to the potential compromise and…read morearrow_forward
Which 2 FA Suits You Best
Defending Your Data: Which Two-Factor Authentication Method Suits You Best?
Aug 18, 2023 Two-factor authentication, commonly referred to as 2FA, is a vital layer of cyber security designed to ensure that you're the only person who can…read morearrow_forward
Cyber Heroes is Demystifying Australia's Notifiable Data Breach Laws for you
Demystifying Australia's Notifiable Data Breach Laws
Aug 09, 2023 In Australia, the Notifiable Data Breaches (NDB) scheme is governed by the read morearrow_forward
Cyber Heroes Will Show You How To Manage Your Supply Chain To Keep Your Data Safe.
Strengthening Supplier Chain Management - how to ensure your suppliers keep your data safe
Jul 26, 2023 In the digital age, businesses are increasingly reliant on supplier chains to deliver goods and services efficiently. However, this…read morearrow_forward
Find Out How You Can Defend Your People, Profits and Reputation From ChatGPTs Evil Twin, Worm GPT.
Is ChatGPTs Evil Twin (WormGPT) Inside Your Inbox?
Jul 21, 2023 There's no doubt, in the grand tapestry of technological progress, artificial intelligence (AI) represents a revolution. As a force for…read morearrow_forward
PCI Compliance:  Cyber Heroes shows you how to safeguard your business and customers' data
PCI Compliance: How To Safeguard Your Business and Customers' Data
Jul 19, 2023 In today's digital landscape, where online transactions have become the norm, ensuring the security of sensitive payment card information is of…read morearrow_forward
The Top 7 things you need to know about General Data Protection Regulations and Cyber Security
Unraveling the GDPR: Protecting Privacy in a Data-Driven World
Jul 12, 2023 In a world increasingly fuelled by data, privacy rights have taken centre stage. A pivotal player in this privacy revolution is the read morearrow_forward
From a cybersecurity perspective, find out how deepfakes can impact individuals, organisations, and society in several ways.
What is Deepfake (and are the risks real)?
Jul 07, 2023 Deepfakes, which refer to manipulated or synthesised media content using artificial intelligence techniques, pose significant challenges to…read morearrow_forward
Cyber Heroes shows you how to implement Data Loss Prevention measures.
What is Data Loss Prevention (and why should you care)?
Jun 30, 2023 In the ever-growing technological world, data has become the new gold. However, along with the enormous benefits of data comes the severe…read morearrow_forward
How SOS Mode on Your Mobile Could Indicate a Cyber Attack.
How SOS Mode on Your Mobile Could Indicate a Cyber Attack
Jun 21, 2023 SOS mode is a feature on many smartphones that allows users to quickly contact emergency services or designated contacts in times of need.…read morearrow_forward
Seven Key Signs To Help You Identify A Fake Website And What To Do If You Suspect Something Is Not Right
Top 7 Ways to Spot a Fake Website
Jun 15, 2023 The Internet is an extraordinary tool that connects us to a world of knowledge, entertainment, and opportunities. However, it's also home to…read morearrow_forward
The Top 5 Cybersecurity Risks Associated With Neglecting User Access Registers
The Top 5 Cyber Security Risks of Not Maintaining A User Access Register
Jun 06, 2023 As we continue to tread further into the digital age, the significance of cybersecurity training has skyrocketed. Whether for individuals or…read morearrow_forward
The Cyber Security Risks Caused To You By Using USB Drives
USB Drives: A Hidden Threat to Business Cyber Security
May 24, 2023 In today's digital landscape, businesses face a multitude of cybersecurity risks that can have severe consequences. While much attention…read morearrow_forward
How To Protect Your Business And Home From The Cyber Risks Of Internet-Connected Printers
The Hidden Cyber Risks of Printers and Multifunction Machines: Protecting Your Business and Home
May 04, 2023 As technology continues to evolve, the devices we use daily become smarter and more connected. This includes printers and multifunction machines…read morearrow_forward
The Importance of https:// And SSL To Ensure Our Online Worlds Are Cyber Safe.
Stay Safe Online: The Importance of HTTPS and SSL Encryption
Apr 25, 2023 The internet has revolutionised the way we communicate, work, and shop. As we rely more on online services, it's critical to take steps to ensure…read morearrow_forward
Five Ways That Using A VPN In Your Personal Life Is A Powerful Tool That Provides Online Security, Privacy, And Freedom.
5 Reasons Why Using a VPN is Essential for Personal Online Security and Privacy
Apr 21, 2023 In today's digital age, cybersecurity has become a growing concern for individuals and businesses alike. With the increasing number of…read morearrow_forward
How To Protect Yourself From The Hi Mum Scam That Cyber Criminals Are Using To Try To Rob You.
Protecting Yourself from the 'Hi Mum' Scam: Top Tips to Avoid Falling Victim to this Ploy
Apr 18, 2023 The "Hi Mum" scam is a highly profitable scheme for cybercriminals that has been causing significant financial losses to Australians.…read morearrow_forward
The Risks of Browser Based Password Managers to Keeping Your People Safe From Cyber Criminals.
The Security Risks of Browser-Based Password Managers: Why You Should Switch to a Password Manager App
Apr 14, 2023 In today's digital age, the need for a password manager has never been greater. With the proliferation of online accounts and the increasing…read morearrow_forward
What Are The Threats Of Website Hacking And Cyber Crime To Professional Service Providers?
The Threat of Website Hacking for Professional Service Providers: Risks, Prevention (With Examples)
Apr 11, 2023 In today's digital age, having a website is essential for professional service providers to reach potential clients and showcase their expertise.…read morearrow_forward
A CyberHeroes Podcast that explains Ransomware, its impact on businesses, and how to protect and recover from Cyber Attacks featuring Greg Edwards, a cybersecurity expert.
Ransomware Explained: How to Protect Your Business From Cyber Attacks
Apr 06, 2023 In this episode of the CyberHeroes Podcast, we discuss ransomware, its impact on businesses, and how to protect and recover from attacks.…read morearrow_forward
The dark side of connected devices - don't sacrifice security for convenience.
The Dark Side of Connected Devices
Apr 04, 2023 The Internet of Things (IoT) refers to the ever-growing network of…read morearrow_forward
Why You Should Not Use Browser Based Password Managers, And How Will A Password Manager App Protect You From Cyber Threats.
Why You Shouldn't Use Browser Based Password Managers
Mar 30, 2023 With the rise of online accounts and the need to create secure passwords, password managers have become increasingly popular. Password…read morearrow_forward
Let's Discuss The Social Engineering Tactics That Cyber Criminals Use To Trick You Into Revealing Sensitive Information.
How To Spot (And Avoid) Social Engineering Tactics
Mar 27, 2023 What is social engineering? Social…read morearrow_forward
How To Set Up A Personal Cyber Security Schedule To Significantly Reduce The Risk To Your Family Of Becoming Victims Of Cybercrime.
How To Set Up Your Simple Personal Cyber Security Schedule
Mar 24, 2023 Managing your personal IT security is essential, and establishing a monthly routine for this purpose can be highly beneficial. Think about all of…read morearrow_forward
By following the steps outlined in this article, you can ensure that your router's firmware is up to date, and your home network is secure from cybercrime.
How (And Why) To Back Up Your Home Router
Mar 21, 2023 The internet has become an integral part of our daily lives, and we rely on technology more than ever. Our homes are filled with smart devices…read morearrow_forward
Cyber Heroes helps you to be cybersafe when using your Smart phones.
Protect Your Digital Life: Top 5 Tips for Securing Your Smartphone Against Cyber Attacks
Mar 17, 2023 Smartphones have become an integral part of our daily lives, and we rely on them for everything from communication to banking and shopping.…read morearrow_forward
Understanding How DMARC, SPF And DKIM Can Protect You And Your Business Against Phishing Attacks.
Protecting Your Email Communication in 2023: Understanding SPF, DKIM, and DMARC
Mar 15, 2023 The COVID-19 pandemic dramatically increased the reliance on email communication, as more people are working from home and relying on email to…read morearrow_forward
Curtis Preston and Cyber Heroes discuss how to respond to a ransomware attack.
Ransomware Attack Recovery Strategies: Expert Insights and Best Practices for Restoring Your Business
Mar 14, 2023 As it turns out, ransomware isn’t ‘technically’ the attack vector, it's the ultimate goal. Most ransomware cases use phishing as the…read morearrow_forward
Zero Day Exploits:  Understanding the threats and how to prevent them, to protect your people, profits and reputation from cybercrime.
Zero Day Attacks: Understanding the Threat and How to Prevent Them
Mar 10, 2023 A zero day attack is a type of cyber attack that exploits a previously unknown vulnerability in a software program or operating system. These…read morearrow_forward
The Importance Of An IT Asset Register To Maximise CyberSecurity.
Maximising Cybersecurity: The Importance of an IT Asset Register
Mar 07, 2023 A question. How many devices do you have in your digital ecosystem? Think about laptops, PCs,…read morearrow_forward
What Must You Do If You Receive A Suspicious Email To Protect Your People From Cyber Crime.
Don't Get Scammed: How to Spot and Handle Suspicious Emails
Mar 03, 2023 A suspicious email can look like it's coming from a legitimate source, but there are a few warning signs to watch out for. Suspicious…read morearrow_forward
An Explanation of Important Email Security Protocols In 2023.
Important Email Security Protocols in 2023
Mar 01, 2023 In today's digital age, email has become an essential mode of communication for businesses and individuals alike. However, the rise of email scams…read morearrow_forward
How Should You Complete Your Cyber Insurance Questionnaire, and How Cyber Heroes Can Help You With That.
How To Complete Your Cyber Insurance Questionnaire
Feb 27, 2023 Welcome to this episode of our podcast, where we will be diving into the world of cyber insurance. Mat discusses what cyber insurance is,…read morearrow_forward
Cyber Security Audits:  The first step in making informed decisions to protect your people from cybercrime.
Cyber Security Audit: The First Step In Making Informed Decisions
Feb 24, 2023 As technology continues to shape our lives and business operations, the need for a robust cybersecurity strategy has become increasingly crucial.…read morearrow_forward
Advanced Persistent Threats and Why They Matter To Businesses In 2023.
Advanced Persistent Threats: Why They Matter To Businesses in 2023
Feb 21, 2023 Small to medium businesses (SMBs) are an attractive target for cybercriminals, as they often lack the resources and expertise to defend…read morearrow_forward
Zero Trust:  What it is, what it is not, and why it matters to businesses.
Zero Trust: What It Is, What It Isn’t, and Why It Matters
Feb 17, 2023 What is 'Zero Trust'? Zero Trust is a security framework that assumes that every person, device, and…read morearrow_forward
What is 2 Factor Authentication and Why Should You Use It As Defence Against Cybercrime?
What is 2 Factor Authentication (and why should you use it)?
Feb 14, 2023 In today's digital age, cybersecurity is becoming an increasingly important concern for businesses of all sizes. From large corporations to small…read morearrow_forward
Cyber Heroes Drills Down Into The Pros and Cons of Using a Managed Service Provider versus a Cyber Security Partner. Blog Posts 20
Managed Service Provider versus Cyber Security Partner
Feb 10, 2023 When it comes to protecting your business from cyber threats, you may be considering hiring a read morearrow_forward
What Are The Legal Responsibilities of Business Owners In The Fight Against Cyber Crime.  Web You Tube Blog Posts 19
Do You Know Your Cyber Security Legal Responsibilities?
Feb 07, 2023 We know talking about legal obligations isn't the most exciting topic, but it is an important one. As you already…read morearrow_forward
Air Gap Backups - How To Securely Back Up Your Data in 2023.
How To Backup Your Sensitive Company Data In 2023
Feb 02, 2023 When protecting your read morearrow_forward
It's not always techy - How Does A Clean Desk Policy Protect Against Cyber Crime?
How Does a 'Clean Desk' Policy Help Prevent Cybercrime?
Jan 31, 2023 What do we mean by a 'Clean Desk Policy'? We're not talking about clutter and a coffee-cup-free working environment…read morearrow_forward
Read about the ways that Physical security can protect you and yours from cybercrime.
The Top 3 Physical Security Techniques To Help Prevent Cybercrime
Jan 27, 2023 Let's start by understanding what we mean by 'Physical Security'. Physical security refers to the precautions businesses take to guard…read morearrow_forward
Read about the many ways that Chat GPT can be used for Good and Evil in your online world.
How ChatGPT Can Be Used For Good & Evil [news]
Jan 24, 2023 This episode covers a recent evolution in technology that has the potential to help your business hugely, but, on the flip side, it represents a…read morearrow_forward
What is information security and why does it matter?  Read this article to find out.
What Is Information Security (and why does it matter)?
Jan 20, 2023 Information security, or "infosec," is the activity…read morearrow_forward
How AI Can Help and Hinder Your Business in 2023.  Web You Tube Blog Posts 1
Cyber Security: The Risks and Rewards Of Artificial Intelligence
Jan 17, 2023 Artificial intelligence (AI) has the potential to…read morearrow_forward
How To Increase Staff Engagement Around Cyber Security.  Web You Tube Blog Posts 16
How To Increase Staff Engagement Around Cyber Security
Jan 13, 2023 As a business owner or manager, it's vital to ensure that all your employees are aware of and committed to maintaining strong cybersecurity…read morearrow_forward
Where to start the cyber security journey, for business owners and managers.  thumbnail
Cyber Security: Where To Start For SMB Owners
Jan 10, 2023 As a small to medium-sized business owner, it's essential to prioritise cybersecurity to protect your people, profits, and reputation.…read morearrow_forward
The Top 3 Cyber Security Trends in 2023 thumbnail
The Top 3 Cyber Security Trends in 2023
Jan 03, 2023 As we look ahead to 2023, there are a few key trends in cyber security that small to medium businesses should be aware of and prepared for.…read morearrow_forward
Read about the importance of Password Policies in 2023
Here's Why Password Policies Matter in 2023
Dec 30, 2022 Now more than ever it is essential for companies to have strong password policies in place to protect sensitive information and maintain the…read morearrow_forward
Use a password manager thumbnail
How To Eliminate Passwords From Your Life
Dec 27, 2022 Sound like a pipe dream? Read on. As you probably already know, passwords are an essential part of our online lives. We use them…read morearrow_forward
Breaking News:  What the WhatsApp Breach means for you and your people.  Web You Tube Blog Posts 12
What The WhatsApp Data Breach Means For You [news]
Dec 21, 2022 In this cyber security snapshot, we talk about the December 2022 WhatsApp…read morearrow_forward
Read our 12 tips for a Happy - and cyber crime free - Christmas.  A priceless gift from The Cyber Heroes Team.
Why Cybercriminals Love Christmas Too
Dec 07, 2022 For most of us, the holiday season is the perfect time to be with family and friends, hang out at the beach, and overindulge in some yummy food.…read morearrow_forward
The Cyber Heroes Team help you to measure your readiness for a Cyber Attack.  Web You Tube Blog Posts 10
How To Assess Your Cyber Attack Readiness [news]
Nov 30, 2022 Ransomware remains the most destructive cybercrime threat in Australia due to its significant financial and reputational costs. To help…read morearrow_forward
Read what we advise you to do if you were involved in the MediBank Cyber Attack.  Web You Tube Blog Posts 8
Involved in the Medibank data breach? [news]
Nov 26, 2022 More than 10 million Australians had their private medical information leaked onto the dark web in October 2022 following an unsuccessful attempt…read morearrow_forward
More advice around combatting insider threats to the cybersecurity of you and your people.  Web You Tube Blog Posts 7
How to Combat Insider Threats
Nov 23, 2022 You may have heard the term ‘insider threat’ before but, what does it actually mean? In the context of cyber…read morearrow_forward
How do Trojan Subscribers sneak under the radar to threaten my networks.  Web You Tube Blog Posts 4
Beware the Trojan Subscribers [news]
Nov 16, 2022 In this cyber security snapshot, we talk about Trojan Subscribers, how they can infiltrate your digital ecosystem and how you can decrease the…read morearrow_forward
Listen in to hear how a Healthcare Professional got hacked for $100k.  Web You Tube Blog Posts 1
How a Healthcare Professional Got Hacked for $100k [podcast]
Nov 15, 2022 This is a story of how a medical professional on the South Coast of NSW got hacked for almost $100,000. Part of what drives us at Cyber…read morearrow_forward
What happens when cybercriminals Phish for your email passwords?
Phishing for a Plumbers Password [podcast]
Oct 21, 2022 When Dave (a plumber) emailed his client to advise that he had a new bank account, all appeared normal and they paid the $5,000 into his new…read morearrow_forward
Was this a simple Gmail gaff or have I been the victim of Identity Theft?
Gmail Gaff or Identity Theft? [podcast]
Oct 21, 2022 Imagine you receive confirmation of a booking for two business class seats to Paris in your name from Singapore Airlines... But…read morearrow_forward