Cybercrime by another name smells just as rotten

By Zak Khan, Advanced Cyber Defence, Trend Micro

The effect of cybercrime on the global economy is massive.  In 2015, malicious data theft left corporations and consumers nearly $500 billion worse off. That’s serious money. We’ve all heard about Sony, Target and Anthem. We think Australia is immune. This is an American problem, right?

On our shores, retailers like David Jones and K-mart have been breached. There are Australian financial institutions whose confidential company and customer data has been stolen and put up for sale on the Dark Web. Indeed, in 2014 the Australian Defence Signals Directorate noted more than a billion dollars’ worth of damage from cybercrime affecting hundreds of local organisations. That’s from the data breaches that were reported to the Feds. 70% of breaches go unreported or worse – unknown. This translates to serious dollars. Yet some feel this is not material and more suited to the latest James Bond flick.

So let’s put hacking and data breaches aside. Let’s talk about the same topic under different guise. Ransomware. Cryptolocker. Australia is a disproportionate target of this malaise. Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.

This type of malware morphs rapidly, making defence via reputation and signatures difficult. This limits the efficacy of traditional mail gateways. Trend Micro’s Deep Discovery Email Inspector works with your incumbent mail gateway adding intelligence, emulation and sandboxing to help defend against this new menace.

Come listen to me at JuiceIT to learn more.

If you haven’t done so already, REGISTER NOW for Data#3’s JuiceIT 2016!

Tags: JuiceIT 2016



Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…