• Home
  • Services
    • Resilience & Continuity
      • Business Continuity Management
      • IT Disaster Recovery
      • Crisis Management
      • Emergency Management Planning
      • Workplace Health and Safety
      • Pandemic Response Planning
      • Risk Management
      • Strategy Development
      • Policy, Plan & Process Development
      • Testing & Exercising Services
      • Governance & Compliance
      • Outsourcing & Managed Services
      • Training Services
      • Training Courses
    • Info & Cyber Security Services
      • IT Security Management
      • Security Review & Assessment
      • Security Risk Management
      • Digital Information Security Policy
      • Vulnerability & Penetration Testing
      • Cyber Security Awareness Training
    • Data Management Services
      • Data Management Training & Awareness
      • Data Management Strategy
      • Data Management Documentation
      • Data Management Platforms & Tools
    • IT Services & Solutions
      • Solution Design & Implementation
      • IT Service Management
      • IT Process & Policy Development
      • IT Sourcing Strategy
      • Technology Refresh Development
      • ITIL Auditing
      • Cloud Risk Assessment
    • RPx BCP Software
    • MiRA Incident Response App
  • About Us
    • Meet The Team
    • Partners
    • FAQ
  • Clients
    • Testimonials
  • Resources
  • Blog
  • Contact
phone-icon
1300 BC PLAN
phone-icon
1300 BC PLAN
Skip to content

Tag Archives: Ransomware

Enterprise Attacks that Start in Mobile Apps

Information SecurityBy opscentreApril 27, 2017

Some IT security attacks start from the most innocent mobile apps and in ways that let cyber-criminals simply pick up confidential communications without having to hack into anything at all.

Ransomware is so 2016 – The New Menace is Ransomworm

Information SecurityBy opscentreFebruary 9, 2017

Don’t take this title too literally. Ransomware, the malware that extorts money from victims to prevent a disaster, will surely continue to be active, at least in the short term.

Will Every IT Security Risk Now Be Followed by a Fake Risk?

Information SecurityBy opscentreJuly 14, 2016

It would be risky to generalise from one specific example in IT security, but the case of fake ransomware is intriguing.

Is It Time to Review Your Malicious Software Reporting Policy?

Business ContinuityBy opscentreJanuary 21, 2014

Be honest – do you currently have a malicious software reporting policy? Just relying on the existence of anti-virus software and firewalls may be too optimistic nowadays. The potential damage to information assets and productivity, let alone identity or bank account theft, suggests that a malware reporting policy should be in place in any organisation.…

Go to Top
  • RSS Link
 
LINKS
  • Privacy
  • Disclaimer
  • Copyright
  • Spam Policy
 
  • Sitemap
  • Social Media
Contact
  • 1300 BC PLAN
  • [email protected]
  • Level 20, Tower 2 Darling Park,
    201 Sussex Street, Sydney NSW
    2000 Australia

Copyright © 2021 OpsCentre. All Rights Reserved