{"id":874,"date":"2018-10-16T00:35:53","date_gmt":"2018-10-16T00:35:53","guid":{"rendered":"https:\/\/www.shredeasy.com.au\/?p=874"},"modified":"2018-10-16T00:35:53","modified_gmt":"2018-10-16T00:35:53","slug":"data-breaches-and-cyber-criminals-its-your-business","status":"publish","type":"post","link":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/","title":{"rendered":"Data breaches and Cyber-criminals: It\u2019s YOUR Business"},"content":{"rendered":"<p><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\"><em>\u201cAsia Pacific is the world\u2019s fastest growing region. But with great opportunities come serious cybersecurity threats. Attacks are getting more sophisticated. There is a prevalent lack of security preparedness leading to greater scrutiny from stakeholders and higher risks of financial and reputational losses. In today\u2019s cybersecurity landscape, a single oversight can cost your business overnight. It\u2019s time to put security above everything.\u201d<\/em> &#8211; Cisco<\/span><\/p>\n<p><a href=\"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2018\/10\/Cybercriminsals.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-870\" src=\"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2018\/10\/Cybercriminsals.jpg\" alt=\"\" width=\"601\" height=\"401\" \/><\/a><\/p>\n<p><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Australia is the 22<sup>nd<\/sup> most attacked country in the world when it comes to data breaches. <span style=\"background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">A data breach occurs when a cyber-criminal successfully infiltrates a data source and extracts sensitive information. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. The latter is often the method used to\u00a0<\/span><strong>target<\/strong><span style=\"background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">\u00a0companies. <\/span>Cyber criminals often follow these steps when attacking, and it can be useful to identify them for prevention:<\/span><\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Research<br \/>\n<\/span><\/strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">The cyber-criminal looks for weaknesses in the company\u2019s security (people, systems, or network).<\/span><\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Attack<br \/>\n<\/span><\/strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">The cyber-criminal makes initial contact using either a network or social attack.<\/span><\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Network\/Social attack<br \/>\n<\/span><\/strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">A network attack occurs when a cyber-criminal uses infrastructure, system, and application weaknesses to infiltrate an organization\u2019s network. Social attacks involve tricking or baiting employees into giving access to the company\u2019s network. An employee can be duped into giving his\/her login credentials or may be fooled into opening a malicious attachment.<\/span><\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Exfiltration<br \/>\n<\/span><\/strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Once the cyber-criminal gets into one computer, he\/she can then attack the network and tunnel his\/her way to confidential company data. Once the hacker extracts the data, the attack is considered successful.<\/span><\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Remember&#8230;<br \/>\n<\/span><\/strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Thieves can\u2019t steal what you don\u2019t have. So, remember that you don\u2019t need to collect unnecessary information, reduce the number of places your business retains its data, ensure only select a few employees have access to sensitive data and keep records of who has access and finally, destroy all data once the need for it has expired.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1; mso-ansi-language: EN-AU;\">So, what is E-waste and how do we destroy it?<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1; mso-ansi-language: EN-AU;\">The official meaning of e-waste is \u201cany discarded electronic or electrical devices or their parts.\u201d<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1; mso-ansi-language: EN-AU;\"> That includes computers, hard drives, USBs, CDs, mobile phones, tablets, modems, and in today\u2019s technological environment, we all have at least one of this as a personal device.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 'Times New Roman'; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1; mso-ansi-language: EN-AU;\">That\u2019s a lot of personal information that we have stored. We are responsible for protecting our identity, and securely destroying any information left on these devices when we upgrade or get a new screen. So here are some facts about digital data destruction you should know, so you can keep your private information just that, private.<\/span><\/p>\n<h1 style=\"mso-line-height-alt: 13.5pt; margin: 0cm 0cm 7.5pt 0cm;\"><strong><span lang=\"EN-GB\" style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">Technology Destruction<\/span><\/strong><\/h1>\n<p style=\"line-height: 18.0pt;\"><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">When you delete data from your business computers, hard drives, external drives, it\u2019s gone, right? Wrong.<br \/>\nData and files remain accessible until either overwritten by specific software, or the computer or housing on which they were stored\u00a0is physically destroyed.<\/span><\/p>\n<p style=\"line-height: 18.0pt;\"><span style=\"font-size: 14.0pt; mso-bidi-font-size: 12.0pt; font-family: 'Calibri',sans-serif; mso-ascii-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Arial Hebrew'; color: black; mso-themecolor: text1;\">The team at ShredEasy are experienced in secure data and digital media disposal, ensuring accurate recording of serial numbers no matter if you would like your hardware\u00a0destroyed onsite or offsite. <a href=\"http:\/\/www.shredeasy.com.au\/contact-us\/\">Call our friendly team today.<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cAsia Pacific is the world\u2019s fastest growing region. But with great opportunities come serious cybersecurity threats. Attacks are getting more sophisticated. There is a prevalent lack of security preparedness leading to greater scrutiny from stakeholders and higher risks of financial and reputational losses. In today\u2019s cybersecurity landscape, a single oversight can cost your business overnight. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,42,12,7],"tags":[],"class_list":["post-874","post","type-post","status-publish","format-standard","hentry","category-blogs","category-digital-data-destruction-blogs","category-identity-theft","category-mobile-shredding-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy\" \/>\n<meta property=\"og:description\" content=\"\u201cAsia Pacific is the world\u2019s fastest growing region. But with great opportunities come serious cybersecurity threats. Attacks are getting more sophisticated. There is a prevalent lack of security preparedness leading to greater scrutiny from stakeholders and higher risks of financial and reputational losses. In today\u2019s cybersecurity landscape, a single oversight can cost your business overnight. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Shred Easy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/destroyyourdocuments\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-16T00:35:53+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2018\/10\/Cybercriminsals.jpg\" \/>\n<meta name=\"author\" content=\"Caleb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/\",\"url\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/\",\"name\":\"Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy\",\"isPartOf\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website\"},\"datePublished\":\"2018-10-16T00:35:53+00:00\",\"dateModified\":\"2018-10-16T00:35:53+00:00\",\"author\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28\"},\"breadcrumb\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data breaches and Cyber-criminals: It\u2019s YOUR Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website\",\"url\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/\",\"name\":\"Shred Easy\",\"description\":\"Shred Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28\",\"name\":\"Caleb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g\",\"caption\":\"Caleb\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy","og_description":"\u201cAsia Pacific is the world\u2019s fastest growing region. But with great opportunities come serious cybersecurity threats. Attacks are getting more sophisticated. There is a prevalent lack of security preparedness leading to greater scrutiny from stakeholders and higher risks of financial and reputational losses. In today\u2019s cybersecurity landscape, a single oversight can cost your business overnight. [&hellip;]","og_url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/","og_site_name":"Shred Easy","article_publisher":"https:\/\/www.facebook.com\/destroyyourdocuments\/","article_published_time":"2018-10-16T00:35:53+00:00","og_image":[{"url":"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2018\/10\/Cybercriminsals.jpg"}],"author":"Caleb","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/","url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/","name":"Data breaches and Cyber-criminals: It\u2019s YOUR Business - Shred Easy","isPartOf":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website"},"datePublished":"2018-10-16T00:35:53+00:00","dateModified":"2018-10-16T00:35:53+00:00","author":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28"},"breadcrumb":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/data-breaches-and-cyber-criminals-its-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/"},{"@type":"ListItem","position":2,"name":"Data breaches and Cyber-criminals: It\u2019s YOUR Business"}]},{"@type":"WebSite","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website","url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/","name":"Shred Easy","description":"Shred Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28","name":"Caleb","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g","caption":"Caleb"}}]}},"_links":{"self":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts\/874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/comments?post=874"}],"version-history":[{"count":0,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts\/874\/revisions"}],"wp:attachment":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/media?parent=874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/categories?post=874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/tags?post=874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}