Amanda-Jane Turner's Blog, page 3

September 28, 2020

AusCERT Innovates with its first ever Virtual conference - we can be heroes - excerpt from article

The article was originally published on LinkedIn- and can be seen in it's entirety on that platform at this link Article about AusCERT's first virtual conference [NOTE you need to be logged into the LunkedIn platform to view the article.]

The folowing is an excerpt  of that article 

AusCERT Innovates with its first ever Virtual conferenceThis year really needed some normality, and the loss of so many industry conferences due to the pandemic, was taking even more of that away. Also conferences are ...
 •  0 comments  •  flag
Share on Twitter
Published on September 28, 2020 00:51

June 4, 2020

Guest Post - Louisa Vogelenzang - 5 behaviours that demonstrate you already have the foundations to manage risk in the online world

Thank you to Louisa Vogelenzang , the cofounder of The Cybersecurity Café podcast for permitting me to reproduce an edited version of her original article on managing online risk.

Image of the earth with lines surrounding it with HTTPS

Whether you are an individual or a small business, I want to show you that you already have solid foundations you can build on, to help you to confidently manage your risks in the online world. Why? because you already practice those skills on daily basis as a part of the way you secure your physical world.

Let's star...

 •  0 comments  •  flag
Share on Twitter
Published on June 04, 2020 08:00

May 1, 2020

Guest Post - Louisa Vogelenzang - You know how to safeguard your keys in the physical world – here’s how to do it in the online world!

Thank you to Louisa Vogelenzang , the cofounder of The Cybersecurity Café podcast for permitting me to reproduce an edited version of her original article on passwords.
image of a bu nch of antique keys on a ring sitting on a wodden table


Keys - to your house, your car, your garage, your bike, your workplace– we’ve all got them and most of us have experienced some level of anxiety when we misplace them or worse still, they are compromised.
If you have a bunch of keys nearby, have a look at how they are all quite unique - from house keys to car keys to bike locks, to...
 •  0 comments  •  flag
Share on Twitter
Published on May 01, 2020 00:11

March 16, 2020

Guest Post - Shelly Mills - World Backup Day

Whats your personal back up plan? Tuesday 31 March is World Backup Day 
Weve all heard stores of (or experienced) losing an important document due to the blue screen of death, losing precious photos due to a device dying, or even losing all files after falling victim to malware or ransomware. 
The only way to protect yourself against valuable data loss in situations like this (which could happen to anyone even IT professionals!) is through regular backups.  

...
 •  0 comments  •  flag
Share on Twitter
Published on March 16, 2020 00:16

March 2, 2020

Guest Post - Vaishnavi Shimpi - let's stop phishing


Thanks to Vaishnavi for this great reminder about phishing!

I got a call the other dayI won a lottery, such a lucky day.They sounded very flatteringBut I didn’t recollect ever participating.You are our loyal customer, this is a special one,Amongst many nationwide, you are the 'chosen one'!Send us your bank details, So that we can 'transfer' the moneyWe also need your 'verification'.And they asked me for my personal history...------------
My bank account is blocked they said.I panicked, and...
 •  0 comments  •  flag
Share on Twitter
Published on March 02, 2020 18:19

Excerpt from book Unmasking the Hacker - phishing



The term phishing originates in 1996 with theAOHell scammers and it is a type of technology-basedfraud where emails are made to appear as being sentfrom legitimate companies or familiar people in orderto trick the recipients. There is nothing mystical inwhy phishing is successful, and neither are the perpetratorsof this type of cybercrime shadowy figures inhoodies. Phishing emails exploit human psychology,using social engineering techniques, to trick the recipientinto providing their account...
 •  0 comments  •  flag
Share on Twitter
Published on March 02, 2020 02:40

January 30, 2020

January 16, 2020

Guest Post - Shelly Mills - Cyber crime - who is committing it?

Thanks to my colleague Shelly Mills  for writing this post on the people behind cybercrime.
Have you ever wondered who is responsible for data breaches, viruses, phishing scams, and so on?  
The people who are responsible for cyber security incidents are called Cyber Threat Actors. And the way in which they get to you is called an Attack Vector (examples of attack vectors include malware, social engineering, vulnerabilities in...
 •  0 comments  •  flag
Share on Twitter
Published on January 16, 2020 23:41

January 5, 2020

Guest Post - Sasenka Abeysooriya - Data governance is essential to cyber security


Thanks to my colleague Sasenka Abeysooriya for kindly contributing his expertise and time to write an article on data governance and its importance to cyber security.  Sasenka not only is an expert in data governance, but also a keen supporter of the community. He is on the Board of Directors of Put Them First a not-for-profit organisation committed to enhancing the alternative care system for young children.


image of a laptop computer with rainbow light against a dark background [image credit  Tianyi Ma]
Cyber security is getting a lot of...
 •  0 comments  •  flag
Share on Twitter
Published on January 05, 2020 21:41

January 4, 2020

Excerpt from book Unmasking the hacker - protect yourself from #phishing

It is Sunday 5 January 2020 as this is published and I am working on editing and writing more for my book and hope to have it in a good state to self publsh by end January 2020!
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated with them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...
 •  0 comments  •  flag
Share on Twitter
Published on January 04, 2020 17:43