Cybercriminals double down on Ransomware boom - Technicalities

Cybercriminals double down on Ransomware boom

Ransomware is one of the biggest forms of cybercrime that businesses of any size face today, so how can we protect against it?

Cyberattacks, in particular Ransomware, are on the increase in Australia.

The average remediation cost of a ransomware attack in Australia is $1.12 million

The Essential 8, employee training and the use of Business Continuity technologies will put your firm in a strong position to defend against these threats.

Haydn Corbety


Think your business is too small to attract threats? Big mistake.

Cyber criminals don’t generally target individuals or businesses – they target vulnerabilities. A business of two is as prone to attack as a large corporation if a vulnerability is detected. According to data from the Global Economic Crime Survey captured by PWC, 60% of all targeted attacks in Australia struck small and medium sized businesses.

So what can you do to protect your firm?

1. Start with the Essential 8 – The Australian Cyber Security Centre (ACSC) recommends 8 strategies to assist organisations in protecting their systems against a range of adversaries, known as the Essential 8. The Essential 8 should form the basis of your cyber security strategy.

The Essential 8 strategies are:

  • Application Control – to prevent execution of unapproved /malicious programs
  • Patch Applications – ensure your applications are kept up to date with the latest versions and security updates
  • Configure Microsoft Office Macro Settings – Macros within Microsoft programs are commonly used to deliver malicious software such as malware. Block macros from the internet and only use trusted macros
  • Application Hardening – Audit what applications are in use and what vulnerabilities may exist. Remove applications not in use or considered risky
  • Restrict Administrator Privileges – only provide administrator level access to those really requiring it
  • Patch Operating Systems – ensure your operating systems are kept up to date with the latest security patches
  • Multi-Factor Authentication – implement multi-factor authentication across all key applications
  • Daily Backups – regularly backup all data and store a copy securely off site, disconnected from your network

2. Training all staff on cybersecurity best practice

Employees are a security risk when they are unaware of what they should and shouldn’t be doing. They may be unaware of the risk of connecting to an insecure Wi-Fi network, how to identify a potential phishing email, or the dangers of installing illegitimate apps.

Organisations should look to ensure all employees undergo regular cybersecurity content and awareness training and that best practice is communicated to all staff.

3. Employ the use of specialised Business Continuity technologies that not only detect potential Ransomware, but also allow you to quickly roll back to a previous version of your data from before the Ransomware attack took place.

Regardless of the size of your firm, you are a potential target of cybercrime. Consult with an expert to get ahead of the game and employ strategies that mitigate the risk of these attacks.

Haydn Corbett is the CEO of Technicalities Group Consulting, an IT Consultancy specialising in Cyber Security strategies for businesses. Technicalities provide advice and services to a number of Legal Firms and are certified IT Partners of Leap Legal Software.

Other news & articles

Why choose Technicalities as your MSP?

Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

CrowdStrike: The crash and Repercussions

CrowdStrike: The crash and Repercussions Just over a week ago, nearly everything ground to a halt. Microsoft computers started crashing which caused an outage that globally stopped 5,000 flights from taking off, supermarket checkouts to stop working, and Marvel Stadium to only allow patrons in based on viewing membership cards; like back in the 1990s.…

The AI Future: What is Microsoft Copilot?

The AI Future: What is Microsoft Copilot? Microsoft Copilot is an AI-powered assistant integrated into Microsoft Office applications, designed to enhance productivity and streamline workflows. Leveraging advanced machine learning and natural language processing capabilities, Copilot can help draft documents, create presentations, analyse data, and automate repetitive tasks. Key features of Microsoft Copilot include: By harnessing…

How Copilot Handles Your Data in Microsoft 365

How Copilot Handles Your Data in Microsoft 365 In an era where digital collaboration and productivity tools have become essential, understanding how your data is managed and protected is crucial. Microsoft 365’s Copilot feature is designed to enhance productivity by integrating AI-driven assistance across various applications. This blog delves into how Copilot handles your data…

Why choose Technicalities as your MSP?

Why choose Technicalities as your MSP? Technicalities is a Managed Service Provider (MSP) that provides a range of IT services to organisations of all sizes. With years of experience in the industry, Technicalities has established itself as a market leader, and reliable MSP. Technicalities is a great MSP for many reasons. We have technical expertise,…

CrowdStrike: The crash and Repercussions

CrowdStrike: The crash and Repercussions Just over a week ago, nearly everything ground to a halt. Microsoft computers started crashing which caused an outage that globally stopped 5,000 flights from taking off, supermarket checkouts to stop working, and Marvel Stadium to only allow patrons in based on viewing membership cards; like back in the 1990s.…

The AI Future: What is Microsoft Copilot?

The AI Future: What is Microsoft Copilot? Microsoft Copilot is an AI-powered assistant integrated into Microsoft Office applications, designed to enhance productivity and streamline workflows. Leveraging advanced machine learning and natural language processing capabilities, Copilot can help draft documents, create presentations, analyse data, and automate repetitive tasks. Key features of Microsoft Copilot include: By harnessing…

How Copilot Handles Your Data in Microsoft 365

How Copilot Handles Your Data in Microsoft 365 In an era where digital collaboration and productivity tools have become essential, understanding how your data is managed and protected is crucial. Microsoft 365’s Copilot feature is designed to enhance productivity by integrating AI-driven assistance across various applications. This blog delves into how Copilot handles your data…

Embracing the Future with Pure Storage

Embracing the Future with Pure Storage In the ever-evolving landscape of data management, staying ahead of the curve is essential. As part of Technicalities’ commitment to providing top-tier services and maintaining operational excellence, we have recently upgraded our data centre infrastructure with Pure Storage. This strategic investment underscores our dedication to leveraging cutting-edge technology to…

Cyber Awareness Training: Our Partnership with Phished

Cyber Awareness Training: Our Partnership with Phished In today’s digital age, cybersecurity threats are an ever-present concern for individuals and organizations alike. Among these threats, phishing remains one of the most prevalent and damaging. As cybercriminals continually refine their techniques, it is imperative that we stay ahead of the curve to protect our sensitive information…

Protect Yourself Online – A recommendation for safer browsing

Protect Yourself Online – A recommendation for safer browsing In today’s digital age, we are more connected than ever. The internet is an invaluable tool for staying in touch with loved ones, learning, socialising, playing games or life management such as banking. However it also exposes us to online threats such as identity theft, scams…

Cyber Security Review: Microsoft 365

Cyber Security Review: Microsoft 365 Cyber Security is a rapidly evolving space. What works today could be exploited tomorrow. On a daily basis we at Technicalities are researching the latest scams, viruses and vulnerabilities within both software and hardware. Many of our customers live in the Microsoft 365 world due to its ease of communication…

Microsoft 365 Backups

Microsoft 365 Backups By default, Microsoft does not offer backup. If an email or file is deleted, it will likely sit in the ‘Deleted Items’ folder or Recycle Bin for a limited amount of time, often 30 days. Technicalities offers a backup solution that covers all Microsoft 365 emails, and files from OneDrive and SharePoint.…

The Need for a Good Firewall

The Need for a Good Firewall Almost all organisations employ a firewall as a security tool that monitors and filters internet access in and out of their network. However even the best firewalls, if not properly configured and implemented, may not provide much protection at all. We so often see organisations compromised by attackers exploiting…

SIEM as a Service

SIEM as a Service Technicalities now offers (Security Information & Event Management) as a hosted service. Networks that sit behind a firewall appear to be safe, however the firewall (in its basic form) is meant to block incoming and outgoing connections. However, there must be some openings in order to allow in certain traffic such…

Callback Phishing Avoids Filters

Callback Phishing Avoids Filters A new form of phishing is appearing and it has the ability to avoid email filtering programs. Phishing is the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to entice individuals to reveal personal information, such as passwords and credit card numbers. Unlike…

Application Whitelisting

Application Whitelisting In today’s digital age, Application Whitelisting has become an increasingly popular security measure. So much so that it is the Number 1 recommendation on the Australian Government’s ‘Essential Eight’ list of recommendations.. The concept behind application whitelisting is simple: Rather than trying to block every potential threat, you simply allow only authorised applications…

The Importance of Endpoint Detection and Response (EDR)

The Importance of Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) is a crucial element in the modern cybersecurity landscape. As organisations are moving more of their business online and relying on digital data storage and communication, the risk of cyberattacks has increased significantly. Endpoint Detection and Response provides the necessary tools to…

The Essential Eight

The Essential Eight While it may sound a little boring, and it may never be required, the ‘Essential Eight’ is something that needs to be on every business’ radar. In today’s fast-paced and interconnected world, cyber threats are becoming increasingly sophisticated and frequent. Organizations are at constant risk of losing critical data or being disrupted…