Amanda-Jane Turner's Blog, page 3
September 28, 2020
AusCERT Innovates with its first ever Virtual conference - we can be heroes - excerpt from article
The article was originally published on LinkedIn- and can be seen in it's entirety on that platform at this link Article about AusCERT's first virtual conference [NOTE you need to be logged into the LunkedIn platform to view the article.]
The folowing is an excerpt of that article
AusCERT Innovates with its first ever Virtual conferenceThis year really needed some normality, and the loss of so many industry conferences due to the pandemic, was taking even more of that away. Also conferences are ...June 4, 2020
Guest Post - Louisa Vogelenzang - 5 behaviours that demonstrate you already have the foundations to manage risk in the online world
Thank you to Louisa Vogelenzang , the cofounder of The Cybersecurity Café podcast for permitting me to reproduce an edited version of her original article on managing online risk.
Whether you are an individual or a small business, I want to show you that you already have solid foundations you can build on, to help you to confidently manage your risks in the online world. Why? because you already practice those skills on daily basis as a part of the way you secure your physical world.
Let's star...
May 1, 2020
Guest Post - Louisa Vogelenzang - You know how to safeguard your keys in the physical world – here’s how to do it in the online world!
Keys - to your house, your car, your garage, your bike, your workplace– we’ve all got them and most of us have experienced some level of anxiety when we misplace them or worse still, they are compromised.
If you have a bunch of keys nearby, have a look at how they are all quite unique - from house keys to car keys to bike locks, to...
March 16, 2020
Guest Post - Shelly Mills - World Backup Day
Weve all heard stores of (or experienced) losing an important document due to the blue screen of death, losing precious photos due to a device dying, or even losing all files after falling victim to malware or ransomware.
The only way to protect yourself against valuable data loss in situations like this (which could happen to anyone even IT professionals!) is through regular backups.
...
March 2, 2020
Guest Post - Vaishnavi Shimpi - let's stop phishing
Thanks to Vaishnavi for this great reminder about phishing!
I got a call the other dayI won a lottery, such a lucky day.They sounded very flatteringBut I didn’t recollect ever participating.You are our loyal customer, this is a special one,Amongst many nationwide, you are the 'chosen one'!Send us your bank details, So that we can 'transfer' the moneyWe also need your 'verification'.And they asked me for my personal history...------------
My bank account is blocked they said.I panicked, and...
Excerpt from book Unmasking the Hacker - phishing
The term phishing originates in 1996 with theAOHell scammers and it is a type of technology-basedfraud where emails are made to appear as being sentfrom legitimate companies or familiar people in orderto trick the recipients. There is nothing mystical inwhy phishing is successful, and neither are the perpetratorsof this type of cybercrime shadowy figures inhoodies. Phishing emails exploit human psychology,using social engineering techniques, to trick the recipientinto providing their account...
January 30, 2020
Guest Post - Nicole Stephensen - The art of talking privacy…
January 16, 2020
Guest Post - Shelly Mills - Cyber crime - who is committing it?
Have you ever wondered who is responsible for data breaches, viruses, phishing scams, and so on?
The people who are responsible for cyber security incidents are called Cyber Threat Actors. And the way in which they get to you is called an Attack Vector (examples of attack vectors include malware, social engineering, vulnerabilities in...
January 5, 2020
Guest Post - Sasenka Abeysooriya - Data governance is essential to cyber security
Thanks to my colleague Sasenka Abeysooriya for kindly contributing his expertise and time to write an article on data governance and its importance to cyber security. Sasenka not only is an expert in data governance, but also a keen supporter of the community. He is on the Board of Directors of Put Them First a not-for-profit organisation committed to enhancing the alternative care system for young children.
[image credit Tianyi Ma]Cyber security is getting a lot of...
January 4, 2020
Excerpt from book Unmasking the hacker - protect yourself from #phishing
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated with them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...


