
How Can The Coronavirus (COVID-19) Disrupt Cybersecurity Operations?
As the global outbreak of the coronavirus deepens, with the novel virus now having been detected in more than 127 countries. Having originated in Wuhan, in the Hubei province in China, the coronavirus (also abbreviated as the COVID-19) and has now evolved into a full-fledged threat that all humans need to be mindful of. Having said that, however, as the number of affected individuals rapidly increases, it is highly imperative that we keep calm, and educate ourselves on the outbreak as much as possible. Most sponsors, guests and exhibitors that canceled late, including the likes of Verizon, AT&T and IBM, cited fears over the coronavirus as the reason behind their canceling. With that being said, the extent to which the virus can cause disruption hugely depends on the nature of the organization’s core business.
- Corona Virus
- Cyber Security
- COVID-19

Android malware can steal Google Authenticator 2FA codes
Security researchers say that an Android malware strain can now extract and steal one-time passcodes (OTP) generated through Google Authenticator, a mobile app that's used as a two-factor authentication (2FA) layer for many online accounts. Google launched the Authenticator mobile app in 2010. The app works by generating six to eight-digits-long unique codes that users must enter in login forms while trying to access online accounts. Google launched Authenticator as an alternative to SMS-based one-time passcodes. Because Google Authenticator codes are generated on a user's smartphone and never travel through insecure mobile networks, online accounts who use Authenticator codes as 2FA layers are considered more secure than those protected by SMS-based codes.
- Security
- 2FA

3 technology trends driving significant change in 2020
To hit the ground running in 2020, I wanted to compile a list of trends that I think will have a tangible impact for small to medium businesses this year. There are plenty of technology trend lists available online, but these tend to focus more at the macro level rather than the specific changes that are possible.
- Increased Automation
- Business Intelligence
- Democratisation of Technology

3 Cybersecurity New Year Resolutions
When it comes to cybersecurity, failing to prepare truly is preparing to fail. Unfortunately, cyberattacks are no longer a case of ‘if’, but ‘when’ for organisations. An ABS survey revealed that 1 in 10 Aussie businesses suffered a cybersecurity data breach last year, and that figure is steadily increasing. By now, CIOs and IT teams should have well and truly finalised reviewing their cybersecurity strategy for the New Year. If you haven’t, it’s not too late to ensure you include these three simple 'cybersecurity New Year resolutions' in your strategy.
- Resolution #1: Prioritise cyber education
- Resolution #2: Ensure your policies and procedures are reviewed and compliant
- Resolution #3: Take your strategy for a check-up

5 Cybersecurity Traps to Avoid
Here are five of the most common cybersecurity traps, and how you can avoid them.
- You are tricked into installing malicious software
- Hackers are able to modify the operating system (OS) settings
- Someone physically accesses your computer
- Someone from within the company infects the system
- Your password is compromised

3 Key Attributes to Look for in a Technology Partner
A few years ago I wrote a blog that outlined some of the key areas that I believed businesses needed to be mindful of when choosing an IT Provider. I focused on the growing threats from ransomware and other cyber threats, and the need to choose an IT provider that proactively focused on continuous improvement and ongoing alignment to industry best practice.
- Look for a partner that specialises in security, particularly cyber training
- Look for a partner that can help you help your customers.
- Look for a partner with a proven track record