• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

SASE – Secure Access Service Edge: A Simple Overview

Cyber Crime Australia, Large Corporation, Remote Working, SME's

Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home.

With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), corporate data networks are struggling with the bottleneck of traffic.

VPN’s may now not be the best solution for your business. So, let’s talk about the latest next-generation security solution.

Pronounced ‘sassy,’ SASE is short for Secure Access Service Edge, a cloud-hosted framework that protects data, end users and applications by using both security and network services. The term was first coined by Gartner in August 2019, who have calculated that “by 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption, encompassing user, branch and edge access, up from 10% in 2020”.

What is SASE?

SASE is a security framework that uses existing technologies to deliver wide area network and security controls as a cloud computing service directly to the source of the connection rather than a data centre or business premise. Security is based on digital identity, real-time context, and company security and compliance policies.

SASE helps to solve the bottlenecking of traffic into the network, by effectively combining security as a service (SECaaS) and network as a service (NaaS) into a single cloud-based service.

This merging of services allows the end-user to work securely from any location or device, without compromising the same level of security you would have in the office.

Implementing it is not the case of buying a single product and setting it up but requires multiple steps to enable services on existing cloud-hosted platforms. For most businesses, the level of expertise required in setting up a SASE approach will mean collaborating with a trusted vendor who understands your business needs.

SASE network- security diagram

How does SASE work?

Current systems may look something like this; traffic comes in via MPLS, internal traffic, or the internet and enters the router, this is then processed through a VPN, and then once verified through a firewall, access is gained to the network.

old network security model

Traffic ends up passing through the internet, security rules are applied, before being sent back out to the internet. This traffic is essentially passing through twice, meaning each security measure is essentially paying for double the amount of traffic, making this model inefficient and expensive.

With SASE, services are managed at the edge of the cloud, so secure communications are delivered to the specific resources the user wants to access, via the fastest path. This can help to provide the same level of security you would see in the corporate workplace, to any remote user, and from any location, device, or application, surely a necessity at this point in time.

SASE model diagram

The core components of the Framework

A SASE architecture can comprise of the following components:

• Software-defined wide area network (SD-WAN). SD-WAN can help simplify communications by finding the best route to the internet or cloud-based apps, optimising user experience.
• Cloud access security broker (CASB). CASB’s can secure cloud-based services by controlling data access and through data loss prevention (DLP). This prevents data leakage and malicious activity.
• Secure web gateways (SWG). SWG’s implement company security policies and filter any unauthorised access or suspicious behaviour. Any unsecure traffic is prevented from entering the network.
• Firewall-as-a-Service (FWaaS). FWaaS encompasses URL filtering, intrusion prevention systems (IPS), and threat protection to prevent cyber-attacks on cloud-hosted platforms.

There are also further recommend levels in the model including Sandbox, WAF, NAC, NGAN/ EDR and browsing Isolation. For an optional level you could also include a VPN or WLAN.

How can SASE benefit my company?

With more people than ever working from home, businesses of all sizes are needing to implement big security changes, fast. With cybercrime on the increase, there is no better time to convert to a SASE framework and secure every single user, device, and application entering your network. The time for updated cloud-based security is now.

Benefits of using SASE:

• Costs are lowered due to fewer hardware installs and a simplified system.
• Latency is reduced by finding the quickest path to the network.
• Zero-trust ensures secure data is only accessed by those authorised.
• Better performance and efficiency as users can access the network from anywhere.
• Keeps your data secure, within the network and prevents web attacks and malicious activity.

Implementing SASE

Steps your organisation can take to implement a SASE approach:

• Move branch offices to a cloud-based perimeter.
• Set up zero-trust network access (ZTNA) for all users.
• Simplify your setup (VPN’s, CASB, SWG) to combine services into a single, more effective system.
• Use an SD-WAN based network, as opposed to MPLS.
• Ensure you have a high-performance edge network to reduce latency issues.

The SASE infrastructure can be overwhelming. If you think your business could benefit from a SASE framework, or you simply just want to find out more, then please do not hesitate to contact one of our experts at Cube Cyber. We are always happy to help.

April 21, 2022/by Sam Topping
https://cubecyber.com/wp-content/uploads/2022/04/cyber-globe-with-office-in-background.jpg 1280 1920 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2022-04-21 23:01:582022-11-24 11:46:06SASE – Secure Access Service Edge: A Simple Overview

GDPR Cyber Security and How It Might Impact Your Business

Cyber Crime Australia, Large Corporation, SME's, Threat Protection

The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security?

What is GDPR?

First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th May 2018. The regulations were created to give individuals more control over their personal data and to ensure businesses comply with how they handle personal customer data. This data could include name, address, IP address, phone number, email address or location data.

It is worth noting that an IP address or a transaction ID alone is not enough to identify an individual. However, if you only collect this information the rules are likely to still apply to you. While this data seems anonymous, if you were to cross-reference a transaction ID with your online store data, the individual could be identified. Therefore, the GDPR regulations will still apply, even though you may not be openly collecting personal information.

If you are collecting detailed personal information such as gender, biometrics, ethnicity, or personal data about children, then you will need to be extra careful when handling this data.

man in corporate jacket pointing finger

Is GDPR relevant to Australian businesses?

Even though you may not be a business in the EU, you may still have to comply with GDPR regulations.
Any business, no matter where you are in the world will need to comply with GDPR if they process any personal data from a person living in the EU. This could be a client, customer or even someone signing up to your online newsletter or visiting your website.

For Australian organisations it is likely that you will be dealing with customers or suppliers who are from the European Union. If this is the case, then GDPR regulations will apply to you.

The basic values or rules concerning GDPR is that you must tell the person that you are collecting their data, what specific data you are collecting and how you will use that data. You must have a lawful reason to collect someone’s data and only use the data for the reasons you have told them. You must get an individual’s consent before collecting any personal data from them.

For example, if someone is signing up to an email newsletter, you must include consent boxes for email marketing, if any future emails will be used to advertise or promote your business. If you state to the customer that by putting in their name and email, they will get some sort of ‘freebie’ or a monthly newsletter with tips for businesses, you cannot then use that email for advertising purposes, as that is not what the person signed up for. You will need a consent box that clearly states by adding their email, they may receive advertising and promotional emails. It is up to the individual to decide and if they do not want such emails, so you must only send emails for the reasons you have stated in the sign up form.

The data should be secured safely and not be held for any longer than need be. You should have a detailed privacy policy which is easy to read and understand, outlining what information you are collecting and what you are doing with it. You also need to state that you will delete all personal data upon an individual’s request.

business fist bumps

GDPR cyber security

In terms of GDPR cyber security, you will need to ensure that personal data is processed and stored securely, in order to lower the risk of any data breaches. Not only does a major data breach hurt a company’s reputation, you may also be liable for a hefty fine (up to €20 million or 4% of worldwide yearly income), if you have not fully complied with GDPR regulations. This is enough for cyber security professionals to up their game and to ensure businesses have the best protection to prevent any data loss.

Organisations should make sure that only authorised staff can access any personal information from customers or suppliers. Limiting the amount of people who can access that data and ensuring only those who need the data for their jobs are allowed access, can help prevent accidental data breaches. Those employees who do have access to sensitive customer data should also have training on how to handle, store and send any data and to make sure it complies with your privacy policy.

Any data you collect that can be adnominalized or ‘Pseudonymised’ should be. This will make it harder to identify individuals. Whether you are the controller (the person who decides what data is collected and how) or the processer (the person collecting, storing, and organising the data), you are liable if any information is leaked. If you are working with a third-party processer, such as Mail Chimp for email marketing, then you should ensure they also are complying with GDPR regulations.

Data Loss Prevention (DLP) devices should be implemented to ensure that data is kept secure and personal information is not shared outside the company. In case of an unfortunate data breach, you must have an incident response plan already in place. This sets the groundwork for how you deal with a cyber attack, from identifying the attack and what data has been lost, to containing the attack, notifying the Data Protection Authority, and then recovering and learning from the incident.

For the best protection for GDPR cyber security, it is best to have a multi layered security solution. Firewalls will help prevent malicious software from entering or leaving your network, endpoint protection will help secure all devices (or entry points) into the network, VPN’s and other encryption tools will ensure data is kept secure and cloud security will protect data storage. Managing and monitoring threat detections is also key to preventing any attempted attacks early.

Risk assessment and vulnerability scans need to be performed to assess cyber security solutions and to make sure everything is working correctly.

If you are worried about GDPR cyber security, or would like advanced protection for your organisation, then get a quote with Cube Cyber today, and our friendly experts will talk you through everything.

March 2, 2021/by Sam Topping
https://cubecyber.com/wp-content/uploads/2021/03/GDPR-cyber-security-graphic.jpg 600 1280 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2021-03-02 11:45:202022-11-24 10:50:08GDPR Cyber Security and How It Might Impact Your Business

Cyber Security Australia: Increasing Attacks on Businesses

Cyber Attacks, Cyber Crime Australia, Large Corporation, SME's

Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online.

In the past, businesses only had to really worry about the physical security on their business, easily implemented by security gates and CCTV cameras. In recent years however, there is a new threat. One that we cannot see but it is very real and potentially even more damaging.

Cyber crime is on the rise and attacking Australian businesses. In fact, according to a post by Infosecurity during the first six months of 2020 alone, ransomware payments doubled. With hackers finding new ways to compromises organisations, these ransom demands are likely to increase.

Scott Morrison cyber attack

Back in June 2020, an attack on Scott Morrison’s government was carried out by a state-sponsored actor. This attack was not just on the prime minister but on all levels of government from the healthcare industry, education, political sectors, and other primary sectors in the infrastructure.

It is unclear whether these state-actors got what they came for or what they will do with the information. Reasons for foreign state-actors infiltrating other governments could be to send a warning, to spy, find out sensitive information or research, or to steal data for financial gain.

Whatever the reason behind this attack, it only goes to show that even the most high-profile of organisations can be the victim of cybercrime. Whether you are a large government agency or an individual running a small business, cyber security needs to be a priority.

Increasing vulnerabilities in cyber security Australia

Why are there increasing cyber security attacks on Australia? Cyber security in Australia needs to be at the top of every organisation’s priority list. Australian businesses have money to steal. A wealthy economy that makes use of the latest technologies will always be at risk from harmful cyber threats.

In the current situation with the pandemic, we are seeing even more cyber threats to Australian businesses. In April 2020, the Australian Cyber Security Centre (ACSC) reported an increased in the amount of COVID-19 themed cyber attacks. Hackers and cyber criminals are taking advantage of the fear and uncertainty of coronavirus, as well as the increased in people working remotely.

For smaller businesses, where the level of cyber security may be limited, this can put SME’s at a greater risk. For smaller business check out this helpful graphic from the government site on best cyber practices.

The ACSC has recently warned the healthcare industry of the latest attacks that have been seen rising throughout the pandemic. One of these threats is SDBBot Remote Access Tool (RAT). This piece of malware is used by criminals to remotely take over multiple systems within an organisation. Hackers will go through the system and copy any sensitive information they can use to sell or blackmail the victim. Another recent attack is named Cl0p ransomware. Once a hacker has gained access using RAT, they can then use Cl0p to encrypt the organisations files to make them unreadable (in order to charge a ransom).

October 2020 saw German company Software AG fall victim to this attack. The hackers demanded US$20 million in ransom. The company’s data was leaked online after they did not pay the ransom.

Cyber threats are also increased with many staff members country-wide now working from home, often using insecure devices such as smartphones, personal laptops and devices used via the Internet of Things (IoT). When using insecure devices or networks, the chance for a data breach is greatly increased.

The more applications, devices, systems, networks, and Wi-Fi we use, the more chance of malware being infected into businesses. Once a company has been compromised, it is at risk from a ransomware attack, stolen money, damage to internal systems and devices, customer information being leaked, identity theft and more. If personal customer data has been leaked, you may also be facing more hefty fines for breaking data protection laws. Risking a cyber attack is simply not worth it.

What is the Government doing in cyber security?

The 2020 cyber security strategy from the Australian government has said it will invest $1.67 billion in cyber security, over the next ten years. The strategy outlines detailed advice for individuals, SME’s, large corporations, and government sectors.
There are three sectors the report details, where cyber security practices and different approaches need to be put in place: government, businesses, and the community.

Government

• Safeguard essential infrastructure, crucial services, and families
• Tackle cyber-crime, together with the dark web
• Protect government information and systems
• Sharing cyber threat intelligence
• Keep cyber security alliances strong
• Help organisations to implement cyber security practices
• Improve resources for cyber security

Businesses

• Enhance standard cyber protection for critical services
• Advise SME’s of best cyber security measures
• Deliver secure merchandise and services to customers
• Develop trained personnel in cybersecurity
• Monitor and stop attempted malware hacks

Community

• Advise and guide individuals on cyber security
• Make familiar buying choices
• Ensure cyber incidents are reported
• Know how and where the find cyber support

The report documents clear advice and guidance for individuals, businesses, and government sectors. They will do this by providing advice on the latest cyber threats, how to keep your business and devices secure, including the Internet of Things (IoT), and by stating clear obligations for businesses.

Each sector will have a role to play. Governments need to ensure they are protecting the most essential infrastructure and Australian businesses. Business themselves should make sure their products and customer data are made secure. Individuals need to stay vigilant and to understand the cyber threats on the web, before releasing any personal data or buying goods online.

The 2020 Australian cyber security strategy provides all Australian’s and organisations the tools they need to stay cyber secure. The strategy hopes to build trust and awareness of cyber security attacks in Australia and to advise on how to deal with those attacks. By addressing the community and organisations as a whole, this guidance provides a valuable tool for everyone to implement good cyber security measures, whether at home or work.

Cyber Security protection from Cube Cyber

Here at Cube Cyber, we are passionate about protecting businesses of all sizes. We believe in going that extra mile to protect our customers businesses. We build lifelong partnerships and provide the best protection to our customers.
For more information about our services please visit our contact page.

Psstt…we are also on LinkedIn and would love for you to give this article a share!

February 12, 2021/by Sam Topping
https://cubecyber.com/wp-content/uploads/2021/02/man-in-dark-on-laptop.jpg 853 1280 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2021-02-12 03:21:182022-11-24 10:53:01Cyber Security Australia: Increasing Attacks on Businesses

Cyber Security Risk: What would it cost if your company could not work for one day?

Cyber Attacks, Cyber Crime Australia, Large Corporation, SME's

Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation.

Have you ever thought about what you could lose if your business were to go offline from a distributed denial-of-service (DDoS) attack, or if your employees could not work on files after they have been hacked into and encrypted? What would just one single day of not being able to work cost your company?

You would not leave your house or your car before locking it first, so why not protect the most important aspect of your business- the money making. Cyber security should not be thought of as another chunk out of the budget, but an essential tool to protect the core of the business. Cyber security and revenue really do go hand in hand.

Many companies, particularly small businesses, and SME’s, see cyber security risk as something that may or may not happen to them, perhaps not considering the full implications of what a cyber attack would have on their organisation.

Businesses no matter the size are at a risk of all kinds of cyber threats from phishing attacks (the number one and most common cyber attack), ransomware attacks, DDoS threats, malware attacks and more. These cyber threats are ever-growing and are always being developed to become even more sophisticated. It is vital that whatever the size of your organisation, cyber security risk is taken into account and taken seriously. But how do we do this?

man and women drawing work diagram

How businesses can calculate the risks

A cyber security risk assessment is a vital start for any business looking to purchase cyber security. Before you know which solutions will work for your company, you must first assess the risks. Every organisation should individually access their own risks, as this of course will vary from business to business. The Gov website has more information here.

By looking at the risks and performing a security assessment, you can determine the strengths and weaknesses of your systems, any weakness or vulnerability holes in your systems and how effective your current cyber security plan is working. From here, you will be in a better position to implement practical solutions in the right areas.

When calculating the cost of potential cyber security solutions, you should ask yourself what it would cost if your company went down for just one day. What would you lose in sales, revenue, potential new customers, even reputation? Work this out, and you may find that the cost of a single day is the same or greater than the yearly cost of cyber security protection. Those not willing to invest in the right cyber security solutions are taking a huge risk, particularly for SME’s who often find it hard to even recover at all from a cyber incident.

When completing a cyber security risk assessment, you need to identify the main cyber threats to your company. Most businesses all have the potential to be a victim of common cyber attacks, such as phishing, malware and ransomware attacks, but some organisations may be more likely to face other types of attack. For example, a government organisation may be at extra risk from cyber espionage or the healthcare industry may be at risk of advanced domain hijacking or DDoS attacks.

Once you have a list of the most vulnerable threats, you will need to determinate how each of those attacks would affect your business.

  • If your files were encrypted in a ransomware attack, would you have backups of that data?
  • And what would the implications be if any sensitive files were to be uploaded to the dark web?
  • How would you deal with data protection laws?
  • If hackers were able to take your ecommerce site offline for a day, or even a few hours, what would you gain to lose from loss of sales?
  • If any of your machines are physically damaged, what would the costs be to replace them?
  • How will you regain trust back in any customers who have lost faith in the reputability of your organisation?
  • Do you have a recovery plan for a data breach, do your staff know what to do in the event of an attack?

These are all questions which will need to be answered. Once you have an idea of the threats to your business and how they will affect you, you can start to determine the right solutions to protect against each threat. Order the threat list in terms of the highest priority or threat level, to the lowest, putting security in place for the biggest threats first.

man on laptop and women writing on board

How a cyber security risk assessment can help

The biggest benefit, other that being protected from cyber threats, is the long term cost for an all-round cyber plan. The cost of cyber security will likely be lower than the cost of recovering from an attack. Applying a risk reduction point of view can help protect your businesses revenue and most valuable assets.

A complete cyber plan will protect your organisation against data breaches, comply with data protection regulations, prevent the loss of sensitive files, and help prevent malicious activity from entering your network. If you think that the cost of an annual cyber subscription may be the same as a day’s revenue, then it is really a no brainer.

At Cube Cyber, we can help both SME’s and large corporations come up with a complete cyber protection plan. We do all the hard work, finding the vulnerabilities in your systems, implementing advanced cyber solutions, and then monitoring and reporting back to you.

For any questions or details, please ask one of our cyber experts via our website.

February 12, 2021/by Sam Topping
https://cubecyber.com/wp-content/uploads/2021/02/cyber-security-risk-illustration.jpg 1017 1920 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2021-02-12 02:56:452022-11-24 10:53:53Cyber Security Risk: What would it cost if your company could not work for one day?

Which Industries Are Most Vulnerable to Cyber Attacks in 2021?

Cyber Attacks, Large Corporation, SME's

Any organisation, whether large government corporation, a small enterprise, an individual running a small business, or even the general web user, are vulnerable to cyber attacks. With the rise in cyber crime in 2020, it is vital that ALL companies enable the best preventative measures they can.

That being said, there will always be organisations more vulnerable to cyber attacks, simply because the nature of their business and the amount of data they hold. Here is a list of the most vulnerable sectors to cyber attacks.

medical scientist

Healthcare

According to Black Book Market Research in 2019, the cost of data breaches within the healthcare industry cost around $4 billion US dollars. The healthcare industry continues to be one of the most vulnerable to cyber attacks and often the healthcare staff are not fully aware of cyber security measures.

The healthcare sector stores millions of medical records electronically, including personal customer details and financial data. Records will contain, names, addresses, medical history, national identity numbers and billing information. This of course, is a magnet for cyber criminals. Worryingly, there has been an increase in COVID-19 related attacks throughout the pandemic. Scams include fake apps or websites and pandemic-related phishing emails.

IT

Man in the middle attacks can be used to target IT companies and cloud service providers, which can store personal information of customers ad staff. Hackers can intercept communications, gaining access to the network. From here, they are able to impersonate suppliers, and get their hands-on sensitive customer information.

Finance

Financial organisations are always going to be at risk due to the large amount of sensitive data they hold, such as customer bank account and credit card details. A Clearswift report in the UK in 2019, said that over 70% of financial organisations had been the victim of a cyber attack. Financial institutions face threat of targeted attacks from organised crime and state-sponsored actors. Employing advanced cyber security protection, it vital for banks, and other financial organisations. They need to stay up to date with payment methods and new technologies to stay secure.

Construction

With sensitive data such as blueprints, financial information, and personally identifiable information (PII) being stored in company systems, construction companies can be a target for ransomware and malware attacks. If all this information is available and stored on the same system, hackers can easily gain access to a wealth of private information to be used for a ransom.

SME’s

Small and medium sized enterprises (SME’s) often underestimate the need for cyber security. This lack of knowledge, expertise, or willingness to invest in cyber protection can leave enterprises vulnerable to cyber attacks.

Smaller companies may not realise the risks, they may not think a cyber attack will happen to them or they may not have the budget or large teams to control cyber security. Hackers are drawn to SME’s as it is often easier for them to gain access to their systems, which can still hold a large amount of customer data and personal information.

HR

HR and recruitment companies can be vulnerable to cyber attacks because of the customer data they hold. HR systems can often hold details such as names, addresses, employee bank details, and other sensitive information. They can use this information to steal money through payroll fraud or gain customer credentials through a recruitment scam. HR sectors can be at risk of a ransomware attack if the hackers encrypt customer and employee personal information.

Government

Local, state, and federal governments can be particularly vulnerable to cyber threats because they are high profile, holding huge databases of information. Large government organisations are often targeted by foreign state-sponsored actors, as well as hacktivists looking to make a statement or release company secrets. Cyber criminals are also drawn to the amount of personal information there is to be gained by hacking into a government entity.

university library

Education

Schools and universities store many types of personal information of staff and students, such as addresses, phone numbers, financial details, enrolment data and so on. University research sectors can also be vulnerable to cyber attacks due to the current research data they store. A constant turnover of students can make it hard to ensure good password measures and may make the education sector prone to phishing attacks.

At Cube Cyber, we have helped companies from a variety of different sectors, to implement an advanced and continued cyber security plan. We can help you to see where the vulnerabilities lie in your organisation and find practical security measures to help protect you from advanced cyber threats.

To find out more about how we can help your organisation, at a cost-effective price, then talk to one of our experts today. We are here to help you.

 

January 2, 2021/by Sam Topping
https://cubecyber.com/wp-content/uploads/2021/01/employees-sitting-around-a-table-2048x1365-1.jpg 1365 2048 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2021-01-02 05:46:542022-11-24 11:04:05Which Industries Are Most Vulnerable to Cyber Attacks in 2021?

Quick Search

Latest Insights

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

  • Cyber Security Australia: Increasing Attacks on BusinessesFebruary 12, 2021 - 3:21 am

    Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online. In the past, businesses only had to really worry about […]

  • Cyber Security Risk: What would it cost if your company could not work for one day?February 12, 2021 - 2:56 am

    Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation. Have you ever thought about what you could lose if your business were to go offline from a […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Tag Cloud

Cloud Computing Cyber Tips Data Breach emergency plan GDPR Hackers Malware News Office 365 Phishing Attacks Ransomware

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy