“Hackers hone their skills while consumers remain complacent” -Symantec, November 2016 press release.

What is Cyber Security?

Cyber Security is the practice of protecting systems, networks and programs from cyber threats

Why is Cyber Security important?

While this digital era offers enormous opportunity for all of us, this increased connectivity is accompanied by greater exposure to cybercriminal activity.

Due to our nation’s relative wealth and high use of technology, Australia is an attractive target for serious and organised cybercrime syndicates. Due to the possible lucrative financial gains for these organised crime syndicates, businesses are now facing an evolving threat landscape where attack types change daily.

As these cyber threats continue to increase in frequency, scale and sophistication it is now essential for organisations to implement effective and sound cyber security practices to effectively protect digital assets and meet increasing compliance obligations.

Common types of Cyber Threats

“Hackers Hone their Skills While Consumers Remain Complacent,” Symantec, in a November 2016 press release.

In 2018, The largest source of attacks on businesses have been incidents involving phishing, malware, ransomware, compromised or stolen credentials and hacking by other means[1].


Distributed Denial of Service (DDoS)

A Distributed Denial of Service (DDoS) attack attempts to make an online service unavailable by overwhelming it with traffic through use of a compromised network known as a ‘botnet’.

DDoS attacks are most successful in disrupting the availability of data or systems which inflict more serious consequences.

Neustar’s global 2017 survey found businesses reported a cost of $100,000 to $250,000 per hour and at least $2.5 million every time they fell victim to DDoS attacks.



Ransomware is a type of malicious software that locks your computer, system or network until you pay a fee.

ransomware is the fastest growing malware threat. It targets all users and severely damages businesses around the globe.

In the first six months of 2017, there were two large ransomware outbreaks that affected individuals and businesses across the world; in May a variant dubbed ‘Wanacry’ affected over 300,000 computers, followed by the variant ‘Petya’ in July that affected 16,500 computers[2].



Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. Phishing emails appear to be from a known and trusted source, with recent reports of impersonation of large and trusted organisations such as the ATO, Medicare and my Gov.

What this means for your business…

A cyber security incident has the potential to create devastating and lasting impact on a business.

In conjunction with direct financial loss and loss of business productivity, once a company’s security has been breached, repairing the relationship and trust between the business and its customers can be very difficult.

Globally, national governments have intensified their focus on cyber security and data protection. New regulations and greater privacy requirements have recently taken effect in 2018 which now mandate Australian organisations to report notifiable data breaches. This has placed a constant pressure on businesses to ensure they employ active security compliance practices.

What we do…

Protecting your business is our priority.

At Wireless Communications we promote a proactive and adaptive approach to cyber security.

Wireless utilises up-to-date technologies, techniques and expertise to appropriately safeguard against cyber security risks as well as ensuring your organisation is exercising due diligence which aligns with legislative requirements and community expectations.

These include:

– Essential mitigation strategies

– Regular vulnerability assessments and monitoring

– Ongoing staff education/training

– Well implemented policies

– Effective reporting systems

– Proactive network monitoring

– System audits…including physical controls and permissions

– DDoS protection through Telstra Security Services







Leave a Reply

Your email address will not be published. Required fields are marked *