• Skip to main content
  • Skip to primary sidebar
theanswerisyes-logo

Call Us Now On

07 3180 4422

  • Home
  • Contact Us
  • Thinking
  • The Capability Pathways
    • Workforce Gateway
      • Leadership Capability
        • Emerging and Frontline Leaders
        • Communication and Influence
        • Team Leadership and Engagement Programs
        • Conflict and Difficult Conversations
        • Performance Conversations
      • People and Culture Capability
        • Workforce Foundations and HR Systems
        • Recruitment and Talent Management
        • Workplace Culture and Ethics
        • Performance and Reward Systems
      • Safety and Wellbeing Capability
        • WHS Foundations and Legal Duties
        • Psychosocial Risk and Mental Health
        • Emergency Preparedness and Response
        • Physical Risk, Chemicals and Manual Handling
        • Menopause and Life Stage Support
      • Organisational Capability
        • Governance and Structural Foundations
        • Project and Change Capability
        • Operational Systems and Process Excellence
      • Digital and Cyber Capability
        • Cyber Awareness and Human Firewall
        • Cyber Governance and Risk
        • Incident Response and Organisational Readiness
        • Secure Infrastructure and Environments
      • Career and Employability Capability
        • Career Foundations and Direction Capability
        • Job Readiness and Employability Skills Capability
        • Career Growth and Advancement
        • Career Transition and Reinvention
        • Coaching and Career Practice Capability
      • Business and Commercial Capability
        • Business Foundations and Entrepreneurship
        • Marketing, Branding and Visibility
        • Sales, Marketing and Visibility
        • Financial Intelligence and Commercial Performance
        • Strategy, Growth and Scale
      • Government Workforce Capability
    • Human Development Gateway
      • Inner Development Capability
        • Self-Leadership and Personal Mastery
        • Emotional Intelligence and Inner Resilience
        • Purpose, Meaning and Life Direction
        • Reflective Practice and Conscious Decision-Making
      • Educator Development Capability
        • Instructional Design and Digital Delivery
        • Facilitation and Professional Practice
        • Professional Communication and Relational Leadership
      • Student Development Capability
        • Learning Skills and Academic Capability
        • Student Emotional Intelligence and Self-Regulation
      • Family Development Capability
        • Parenting for Learning and Development
        • Family Safety and Digital Protection
        • Healthy Family and Personal Relationships
    • First Nations Capability Gateway
      • Cultural Authority and Governance
      • Learning Through Country
      • Indigenous Ways of Teaching and Learning
      • Identity, Connection and Community
      • First Nations Leadership and Economic Participation
  • Partner With Us
  • Insights
    • The Capability Journal
    • The Answer is Yes Magazine (coming soon)
  • Social Impact
  • About
    • Our Capability Experts
    • Testimonials

Digital and Cyber Capability

The Drawbacks of Focusing on Compliance Over Risk-Driven in Security

In the fast-evolving world of cybersecurity, many organisations fall into the trap of focusing on compliance-driven over risk-driven security strategies. Meeting regulatory requirements is undoubtedly important, but a compliance-first approach often creates a false sense of security. The problem? Compliance does not necessarily equal security.

At Cyber365, we have empowered numerous organisations across industries to move beyond a ‘checkbox’ mentality and adopt risk-driven security strategies. This approach gives you the control to protect your organisation more effectively in an increasingly complex threat landscape, focusing on real-world vulnerabilities rather than regulatory requirements alone.

We believe that true cybersecurity resilience comes from addressing risks specific to your organisation—not just ticking boxes to meet compliance standards.


The Problem with Compliance-Driven Security

Compliance frameworks, such as GDPR, HIPAA, and ISO 27001, provide important guidelines for protecting data and maintaining security. However, organisations often expose themselves when prioritising compliance over actual risk management. Here’s why:

1. Compliance is Reactive, Not Proactive

Compliance frameworks address known threats and risks that regulators have identified. Cyber threats, however, evolve constantly. A compliance-driven approach focuses on meeting yesterday’s standards, leaving organisations vulnerable to today’s and tomorrow’s emerging threats.

2. A Checkbox Mentality

Compliance-driven security often creates a “checkbox” culture where organisations focus on passing audits rather than building a strong security posture. While policies and procedures may look good on paper, they may not address the organisation’s unique vulnerabilities and operational realities.

3. Limited Contextualisation

Regulatory requirements are broad, applying to industries rather than individual organisations. Compliance frameworks may overlook critical risks specific to your organisation’s operations, assets, or industry-specific threats.

4. False Sense of Security

Organisations focusing solely on compliance may feel secure after passing an audit, only to discover that their systems are still vulnerable to real-world attacks. Compliance does not guarantee that your defences are adequate or that your organisation is prepared to respond to a breach.

Because true protection matters, organisations must move beyond compliance to adopt risk-based strategies.


Why Risk-Driven Security is Essential

A risk-driven approach prioritises understanding and addressing the unique threats facing your organisation. Rather than focusing solely on meeting regulatory requirements, risk-driven security is about identifying vulnerabilities, mitigating risks, and building resilience.

1. Tailored to Your Organisation

Unlike compliance frameworks, which take a one-size-fits-all approach, risk-driven security strategies are customised to your specific operational context. You can focus on protecting the most critical assets and processes by assessing your unique risks.

2. Proactive and Adaptive

A risk-driven approach helps organisations anticipate and prepare for future threats rather than reacting to past incidents. By continuously monitoring and evaluating risks, you stay ahead of evolving threats and reduce your exposure to emerging vulnerabilities.

3. Holistic Protection

Risk-driven strategies go beyond technical solutions, addressing people, processes, and technology vulnerabilities. For example, employee training, incident response planning, and supply chain security are all critical components of a risk-based approach.

4. Aligns with Business Goals

Risk-driven security aligns with your organisation’s strategic objectives, effectively allocating resources. Rather than spending on generic compliance measures, a risk-based strategy focuses on investments with the most significant impact.


The Hidden Costs of Compliance-Driven Security

Compliance-driven security can appear cost-effective in the short term, but the hidden costs of a checkbox mentality often outweigh the benefits:

  • Increased Vulnerabilities: Organisations may overlook critical risks outside regulatory frameworks by focusing only on compliance requirements.
  • Missed Opportunities: A compliance-first approach can lead to inefficiencies, with resources spent on meeting standards that do not directly improve security.
  • Reputational Damage: Passing an audit may satisfy regulators, but it does not protect against the reputational damage of a breach. Customers expect more than compliance—they expect security.

Because trust matters, a risk-driven approach protects not only your systems but also your reputation.


Moving from Compliance to Risk-Driven Security

With our extensive experience, Cyber365 is well-equipped to guide organizations in transitioning from compliance-driven strategies to risk-based approaches that effectively address real-world threats. Our Risk Assessments and Cyber Resiliency Reviews are specifically designed to provide actionable insights, empowering organizations to build robust security frameworks tailored to their unique needs.

Step 1: Identify Your Risks

Our Risk Assessments are comprehensive, analysing your organisation’s vulnerabilities across people, processes, and technology. We go beyond regulatory requirements to uncover hidden risks that could disrupt operations or expose sensitive data.

Step 2: Prioritise Action In a risk-driven approach, not all risks are equal. This approach helps you prioritise mitigation efforts, ensuring that resources are allocated where they are most needed. Cyber365’s assessments provide a clear roadmap, allowing you to address high-priority vulnerabilities first.

Not all risks are created equal. A risk-driven approach helps you prioritise mitigation efforts, ensuring that resources are allocated where they are most needed. Cyber365’s assessments provide a clear roadmap, allowing you to address high-priority vulnerabilities first.

Step 3: Build Resilience

Through our Cyber Resiliency Reviews, we help organisations develop strategies to maintain continuity during a cyber incident. This includes creating incident response plans, training employees, and implementing solutions to minimise disruption.


A Balanced Approach: Compliance Meets Risk Management

It is important to note that compliance and risk management are not mutually exclusive. A balanced approach ensures that your organisation meets regulatory requirements while addressing real-world vulnerabilities.

How Cyber365 Helps You Achieve Balance

  • Policy and Procedure Development: Ensure your policies align with regulatory standards and your organisation’s risk profile.
  • Customised Training: Equip your team with the knowledge to identify and respond to threats, from phishing attempts to ransomware attacks.
  • Incident Response Planning: Develop and test response plans aligning with your organisation’s risks.

Because resilience matters, we provide the tools to protect your organisation from regulatory penalties and real-world threats.


Case Study: The Pitfalls of Compliance-Only Security

One organisation we worked with had passed its regulatory audit with flying colours. However, a ransomware attack just weeks later revealed significant gaps in its security posture.

What Went Wrong:

  • The organisation had policies that satisfied compliance requirements but did not reflect day-to-day operations.
  • Employees were unaware of phishing risks and inadvertently clicked on a malicious link.
  • The organisation lacked an effective incident response plan, leading to prolonged downtime and reputational damage.

How Cyber365 Helped:

  • Conducted a Risk Assessment to identify vulnerabilities not addressed by compliance measures.
  • Delivered Cyber Awareness Training to educate employees on recognising and responding to threats.
  • Developed an Incident Response Plan tailored to the organisation’s operations.

The result? The organisation emerged stronger, with a security framework beyond compliance to address real risks.


Build Resilience, Not Just Compliance

Compliance-driven security may satisfy regulators, but it does not guarantee protection. A risk-driven approach addresses your organisation’s unique vulnerabilities, creating a proactive, adaptable, and resilient security posture.

At Cyber365, we specialise in helping organisations move beyond the checkbox mentality. We empower you to face today’s threats with confidence through tailored risk assessments, customised training, and resilience-building strategies.

Because your security should be more than compliant—it should be robust.

Are you ready to move from compliance to resilience? Contact Cyber365 today and start building a security framework that protects what matters most.

Category: Digital and Cyber Capability Tags: cybersecurity, risk-driven

Have We Become Too Dependent on Technology for Cyber Defence?

Organisations are pouring vast resources into technological defences in the fight against cyber threats. Firewalls, endpoint detection, advanced encryption, and AI-driven monitoring tools are essential components of a robust cybersecurity strategy. However, the question remains: Are we over-reliant on technology for cyber defence while neglecting the human element?

At Cyber365, we have seen how technology alone cannot solve the cybersecurity puzzle. The most robust defences are built on a foundation of cutting-edge tools and informed, vigilant people. As the Software Engineering Institute (SEI) at Carnegie Mellon University emphasises, effective cybersecurity requires a balanced approach where technology and human capability work harmoniously.

We believe that the first line of defence is not a system or software but a well-trained, cyber-aware workforce.


The Problem with Technology-First Cyber Defence

Technology is a powerful ally in protecting against cyber threats. Automated tools monitor systems 24/7, machine learning algorithms detect anomalies, and encryption secures sensitive data. These advancements are crucial in the modern cybersecurity landscape. However, an over-reliance on technology introduces vulnerabilities of its own:

1. A False Sense of Security

Many organisations assume that investing in the latest cybersecurity technology is enough to keep threats at bay. However, even the most sophisticated systems can be bypassed if employees are not trained to recognise and respond to risks. For example, a phishing email can compromise credentials, giving attackers access to systems the technology is designed to protect.

2. Neglecting Human Factors

Cybercriminals know that the easiest way to breach an organisation is not through technology but through its people. Social engineering attacks, such as phishing and pretexting, exploit human psychology rather than technical vulnerabilities. Without adequate training, employees remain the weakest link in the cybersecurity chain.

3. Technology Without Context

While technology excels at detecting anomalies, it cannot always determine context. A well-trained human can discern whether an unusual email is legitimate or part of a broader phishing campaign. Relying solely on technology removes this critical layer of decision-making.

Because vigilance matters, organisations must recognise that no technology can replace the need for a skilled, informed workforce.


The Role of Human Defences in Cybersecurity

At Cyber365, we advocate for a balanced approach where technology and human capability complement each other. Employees are the gatekeepers of an organisation’s systems and data, and their actions often determine whether an attack succeeds or fails.

Trained Employees as the First Line of Defence

Well-trained employees act as the eyes and ears of an organisation’s cybersecurity strategy. They can:

  • Recognise Threats: Spot phishing attempts, suspicious links, and other common tactics used by cybercriminals.
  • Respond Proactively: Take immediate action to contain potential threats, such as reporting phishing emails or disconnecting infected devices from the network.
  • Support Incident Response: Provide valuable context and insights during an investigation, such as describing how a breach occurred or identifying compromised accounts.

The Cost of an Untrained Workforce

A lack of cyber awareness training can lead to costly consequences. Consider the following:

  • Phishing Scams: A single employee clicking on a malicious link can compromise an entire network.
  • Weak Passwords: Without training, employees may reuse passwords or choose easily guessed ones.
  • Poor Incident Reporting: Employees unaware of what constitutes a cyber threat may fail to report suspicious activity, allowing attackers to operate undetected.

Cyber365’s Cyber Awareness Training addresses these gaps, ensuring employees know to act as a robust first line of defence. Because prevention matters, investing in training reduces the likelihood of human error and strengthens the organisation.


Technology and Human Elements: A Balanced Approach toward Cyber Defence

Effective cybersecurity is not a choice between technology and people but a partnership. Technology provides the tools to monitor, detect, and respond to threats, while trained employees provide the context, vigilance, and adaptability that technology cannot replicate.

1. Proactive Training

Organisations should implement regular, comprehensive training programs to ensure all employees understand their role in cybersecurity. Cyber365 offers tailored training solutions, including:

  • Cyber Awareness for All Staff: Focused on everyday threats like phishing and password hygiene.
  • Incident Response Workshops: Preparing teams to act decisively during a cyber-attack.
  • CSIRT (Computer Security Incident Response Team) Training: Building skilled teams capable of managing incidents effectively.

By integrating training into the organisational culture, businesses foster an informed and actively engaged workforce that protects the company.

2. Leveraging Technology Strategically

Technology remains a vital component of any cybersecurity strategy. However, it must be deployed in a way that complements human efforts. For example:

  • Phishing Simulations: Use software to test employees’ ability to recognise phishing emails, then provide targeted training based on the results.
  • Incident Management Tools: Equip teams with tools to coordinate responses and track incidents efficiently. Cyber365’s workshops on deploying incident management systems help organisations integrate these tools seamlessly.
  • Threat Intelligence Platforms: These platforms provide employees with real-time insights into emerging threats, enhancing their ability to act proactively.

Case Study: The Impact of a Balanced Approach to Cyber Defence

One organisation partnered with Cyber365 to address recurring phishing attacks that had bypassed their email filters. The company had invested heavily in advanced filtering technology but lacked a robust employee training program.

Challenges Identified:

  • Employees frequently clicked on phishing links, assuming the email filters would catch all threats.
  • Incident reporting was inconsistent, delaying responses to potential breaches.

Solution Implemented:

Cyber365 conducted a Cyber Awareness Training program for all staff and a CSIRT Workshop for the IT team. Employees learned to identify phishing attempts and report incidents promptly, while the IT team gained hands-on experience in managing incidents effectively.

Results Achieved:

  • Phishing attempts decreased significantly as employees became more vigilant.
  • Incident response times improved, reducing the impact of potential breaches.
  • The organisation achieved a more robust security posture by integrating training with its existing technology.

This case demonstrates the power of combining technological defences with a well-trained workforce.


Insights from the Software Engineering Institute

The Software Engineering Institute (SEI) echoes the importance of a balanced approach in its organisational guidance. SEI emphasises that cybersecurity is a holistic effort, requiring:

  • Leadership Involvement: Cybersecurity must be prioritised at the board and executive levels to align resources with risks.
  • Cross-functional collaboration: IT teams, risk managers, and frontline employees must work together to create a unified defence strategy.
  • Continuous Improvement: Both technology and training require regular updates to address emerging threats.

Cyber365 incorporates these principles into its training programs and workshops, ensuring organisations build resilience at every level.


Strengthen Your Cyber Defence Strategy!

Cyber threats are not going away, and attackers will continue to exploit the human element. While technology is essential, it cannot replace the vigilance and adaptability of a well-trained workforce.

At Cyber365, we help organisations achieve the balance they need to thrive in today’s threat landscape. Our tailored training programs and workshops empower employees to act as the first line of defence, complementing even the most advanced cybersecurity technologies.

Because cybersecurity is a shared responsibility, it is time to prioritise the human element in your cyber defence strategies. Equip your team with the knowledge they need to protect your organisation and ensure that technology and people work together seamlessly.

Are you ready to strengthen your cybersecurity strategy? Contact Cyber365 today to build a balanced, resilient defence.

Category: Digital and Cyber Capability Tags: cyber defence, cybersecurity

Cybersecurity: More Than Just an IT Concern

Cybersecurity is imperative for businesses, yet many organisations still treat it as an IT responsibility. This misconception, prevalent across industries, leaves firms vulnerable to increasingly sophisticated threats. At Cyber365, where we help governments and organisations worldwide strengthen their defences, we have seen firsthand how this narrow perspective limits an organisation’s ability to build true cyber resilience.

Cybersecurity is no longer just a matter of protecting networks or securing endpoints. It is about safeguarding operational continuity, reputational integrity, and customer trust. These are not IT issues—they are business priorities. Because cybersecurity matters at every level, it demands active involvement from leadership, including boards and executive teams.


Cybersecurity: A Strategic Business Priority

A 2022 report from the Software Engineering Institute (SEI) at Carnegie Mellon University highlights a critical truth: cybersecurity success depends on the organisation’s ability to integrate cyber risk into its overall risk management framework. This integration cannot happen effectively if cybersecurity is seen as a siloed IT function.

Executives and board members need to understand that cyber threats are business risks. A ransomware attack can halt operations, a data breach can destroy customer trust, and an insider threat can lead to regulatory fines. These consequences impact the entire organisation—not just the IT department.

Why the IT-Only Mindset Fails

When organisations delegate all cybersecurity responsibilities to IT teams, several challenges emerge:

  1. Limited Visibility: IT teams may not have complete visibility into business operations, making it harder to assess the impact of cyber risks on critical processes.
  2. Misaligned Priorities: IT teams focus on technical solutions, while leadership remains disconnected from the broader implications of cyber risks.
  3. Inefficient Resource Allocation: Without board involvement, cybersecurity budgets may not align with the organisation’s actual risk level.
  4. Reactive Responses: Viewing cybersecurity as a technical issue often leads to reactive measures instead of proactive risk management.

The Risks of Relegating Cybersecurity to IT Teams

At Cyber365, we have worked with organisations across the United Kingdom, Australia, New Zealand, and the Pacific Islands to address the fallout from inadequate cybersecurity strategies. A recurring theme is the lack of leadership involvement in cybersecurity planning.

One example involved a mid-sized organisation that suffered a ransomware attack, halting operations for several days. While the IT team scrambled to restore systems, the leadership team was unprepared to manage the business implications, including:

  • Communicating effectively with stakeholders
  • Navigating regulatory reporting requirements
  • Reassuring customers that their data was secure

The result? Significant reputational damage and lost revenue—not because the IT team failed to act, but because the broader organisation could not prepare.

Cybersecurity is a team sport. Organisations are exposed to preventable incidents and poorly managed responses when boards and executives are not actively engaged.


Cyber Resilience Requires a Cultural Shift

True cyber resilience demands a cultural shift within organisations. This shift begins with acknowledging that cybersecurity is a shared responsibility.

1. Leadership Involvement is Non-Negotiable

Board members and executives must treat cybersecurity as a strategic priority. This means:

  • Understanding the Threat Landscape: Leadership should be familiar with the types of cyber risks that could impact the organisation, from ransomware to insider threats.
  • Prioritising Risk Management: Cyber risks should be integrated into the organisation’s overall risk management framework.
  • Allocating Resources Wisely: Budgets for cybersecurity should reflect the actual level of risk the organisation faces, not just historical spending trends.

As the Software Engineering Institute emphasises, leadership is critical in aligning cybersecurity efforts with organisational goals. Without this alignment, even the best IT teams cannot effectively protect the organisation.


2. Cyber Awareness Must Extend to All Levels

Cybersecurity is not just the responsibility of IT teams or leadership; it is a mindset that must permeate the entire organisation. Every employee, from entry-level staff to senior managers, has a role to play.

  • Regular Training: Cyber awareness training, like Cyber365’s Cyber Awareness for All Staff courses, equips employees to recognise and respond to phishing attempts, social engineering, and other threats.
  • Clear Policies: Policies outlining acceptable technology use and incident reporting protocols ensure consistency in how employees approach cybersecurity.
  • Incident Response Planning: Every team member should understand their role in the event of a cyber incident, reducing confusion and ensuring a swift, coordinated response.

Because awareness matters, a cyber-savvy workforce is your best defence.


3. Invest in Proactive Measures

Proactive measures—such as Cyber365’s Cyber Resilience Review and Cyber Risk Assessments—help organisations identify vulnerabilities before they become crises. These assessments provide boards and executives with a clear understanding of their risk exposure and practical steps for improvement.

Proactive strategies should also include:

  • Regular Vulnerability Assessments: Ensuring that systems are updated and patched.
  • Penetration Testing: Simulating attacks to test defences and identify weaknesses.
  • Scenario-Based Training: Preparing leadership and staff for real-world incidents.

Insights from the Boardroom: Cybersecurity as a Business Imperative

As an advisor to boards and leadership teams, I often see a shift in perspective when executives truly engage with cybersecurity. Conversations evolve from “What does IT need?” to “What does the business need to protect its future?”

Boards that embrace cybersecurity as a business imperative often exhibit these characteristics:

  • Regular Engagement: Cybersecurity is a standing agenda item at board meetings, ensuring continuous focus.
  • Dedicated Cyber Expertise: Some boards appoint a cybersecurity expert or establish a cybersecurity committee to oversee strategy.
  • Accountability: Leadership holds all departments—not just IT—accountable for their role in cybersecurity.

How Cyber365 Can Help?

Cyber365 specialises in empowering organisations to move beyond the IT-only mindset. Our training, assessments, and workshops help organisations build resilience from the top down.

  • Cyber Awareness Training for Leadership: This training, tailored for executives and board members, highlights their critical role in managing cyber risks.
  • Risk Assessments and Resiliency Reviews: These services provide a clear picture of your organisation’s vulnerabilities and actionable recommendations for improvement.
  • Workshops on Incident Response and CSIRT Deployment: Ensure leadership and staff are prepared to handle incidents confidently and precisely.

Because leadership matters, we provide the tools to ensure cybersecurity is woven into the fabric of your organisation.


Conclusion: Cybersecurity is Everyone’s Responsibility

The misconception that cybersecurity is solely an IT problem leaves organisations vulnerable in a world where cyber threats grow more sophisticated daily. Organisations must embrace cybersecurity as a shared responsibility to build true resilience, with leadership and board members actively engaged in strategic planning and decision-making.

By fostering a culture of cyber awareness and investing in proactive measures, organisations can move from reactive firefighting to proactive protection. At Cyber365, we stand ready to guide your organisation on this journey, ensuring you are prepared to face the future with confidence and resilience.

Cybersecurity is about more than technology; it involves people, processes, and priorities.

Explore Cyber365’s website or visit The Answer Is Yes! to help you identify which is the best course for you and your organisation.

Category: Digital and Cyber Capability

Hospitality Industry has 2nd Highest number of Cyber breaches

The Hospitality industry is reported to have the second-highest number of Cybersecurity breaches[1]. How are they still being breached even with expensive technical point solutions?

Several reports indicate the hospitality industry is under attack, as are other sectors, and breaches are commonplace[2].  In 2017 Sabre Hospitality was a victim of a security breach which impacted its SynXis hotel reservation system which allowed unauthorised access to payment card information[3].

However, surely with advanced technology available today, you can mitigate the risk, right?  Well yes and no, technology is only part of the solution, often overlooked is the human factor. This can influence the attack vector to gain access and eventually compromise sensitive information within your organisation.

There are some excellent technical products in the market, and yet large corporates are still being breached even with these products being deployed, through no fault of the vendor providing the solution in the first place.

You cannot mitigate every Cyber risk in an organisation, and if anyone tells you, they can, then you should look elsewhere for advice.

So what can I do about it?

The solution should be tailored for your organisation as not one glove fits all!

Here are some, but not limited to, steps you might want to consider:

  • Conduct a Cyber Maturity Review to ascertain what areas may require further enhancements
  • Conduct a Cyber Risk Assessment to identify the critical assets you need to protect and how.
  • Train all staff in Cyber awareness, onboarding and refresher training can help and is cost-effective.
  • Train selected staff to attend professional Cyber training

So don’t just rely on a technical solution.

[1] PwC’s Hotels Outlook report 2018 to 2022

[2] Insights Study into Cyber threats in hospitality

[3] https://www.phocuswire.com/Sabre-updates-on-unauthorized-access-confirms-payment-details-hacked

Explore our Digital and Cyber Security Capability

Category: Digital and Cyber Capability, Safety and Wellbeing Capability

Hackers are checking into hotel systems

It’s official, ‘hackers are checking into hotel Systems’, have you been Phished[1]?

Criminals are after your data so they can steal credentials and use them to get money, and this time it seems the gang associated with these attacks are the same as the ones who took USD 1Billlion from banks.

So how do they do it?

The first step is not hacking a computer but socially engineering[2] a person![3]

Step 1 – A phone call is received at a hotel reservation desk by a pretend hotel guest to discuss a problem confirming a reservation. They say they have a question, and can they help?

Step 2 – The caller says they have information about the reservation and would like an email to send to the reservation desk so the hotel can help them.

Step 3 – The caller sends an email to the reservation desk with an attachment.  The hotel opens the attachment, which has malicious software called ‘Malware’.  The malware is designed to find the sensitive information the caller wants and downloads more Malware tools to assist in its search.

Step 4 – The hotel system is now compromised and send all the information that the caller needed to them and the malware can stay on the system if they want to download future reservation information.

While this story was about a hotel chain, the same approach can be used for many businesses alike, and this is called a ‘Phishing Scam’.  There are different types of Phishing scams, depending on the intended victim.

Help me protect myself from a Phishing Scam!

All staff should be trained on how to spot a potential scam, for example, not posting information on social media such as vacation plans, phone numbers, your address.

[1] The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

“an email that is likely a phishing scam”

[2](In the context of information security) the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

[3] https://whatismyipaddress.com/hacking-hotels

👉 Explore Digital and Cyber Capability

Category: Digital and Cyber Capability, Safety and Wellbeing Capability

The UK might fine Marriot Hotel 99 Million Pounds for data breach

The UK might fine Marriot Hotel £99Million for Data Breach!

Following on from our previous article, it looks like countries are submitting claims against the Marriot Hotel Chain according to the Register UK.[1]

The UK’s Information Commissioners office is the first to file a claim for fining the hotel chain.

If other countries follow suit, it could be a very costly affair, not to mention the reputational damage to the hotel chain.

The Chief Executive of Marriot International stated:

“We deeply regret this incident happened. We take the privacy and security of guest information very seriously and continue to work hard to meet the standard of excellence that our guests expect from Marriott.”

Marriot had admitted to half a billion individuals data had been stolen.

Hotel guests who have previously made a reservation to stay at any of the following, Marriott or Starwood hotel (among others, the group also owns the Sheraton, Ritz-Carlton, and Renaissance brands) should go to the Starwood web page about the data breach.

Tips

Your data may be used by criminals who want to use your identity for financial gain.  Go to the website and check if the breach is relevant to you.

Some password managers and Antivirus products automatically tell you if they find your credentials being used elsewhere. This can include credit card information, email addresses and passwords for sites that you need a login.

Be proactive and get good security awareness advice

[1] https://www.theregister.co.uk/2019/07/09/marriott_hotels_ico_fine_intention_99m_starwood_breach/


Book now for a strategy call

Category: Digital and Cyber Capability Tags: acommodation, cybersecurity

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

Call Us Now On+61 423 596 393

Training Services

  • Home
  • Contact Us
  • Thinking
  • The Capability Pathways
    • Workforce Gateway
      • Leadership Capability
        • Emerging and Frontline Leaders
        • Communication and Influence
        • Team Leadership and Engagement Programs
        • Conflict and Difficult Conversations
        • Performance Conversations
      • People and Culture Capability
        • Workforce Foundations and HR Systems
        • Recruitment and Talent Management
        • Workplace Culture and Ethics
        • Performance and Reward Systems
      • Safety and Wellbeing Capability
        • WHS Foundations and Legal Duties
        • Psychosocial Risk and Mental Health
        • Emergency Preparedness and Response
        • Physical Risk, Chemicals and Manual Handling
        • Menopause and Life Stage Support
      • Organisational Capability
        • Governance and Structural Foundations
        • Project and Change Capability
        • Operational Systems and Process Excellence
      • Digital and Cyber Capability
        • Cyber Awareness and Human Firewall
        • Cyber Governance and Risk
        • Incident Response and Organisational Readiness
        • Secure Infrastructure and Environments
      • Career and Employability Capability
        • Career Foundations and Direction Capability
        • Job Readiness and Employability Skills Capability
        • Career Growth and Advancement
        • Career Transition and Reinvention
        • Coaching and Career Practice Capability
      • Business and Commercial Capability
        • Business Foundations and Entrepreneurship
        • Marketing, Branding and Visibility
        • Sales, Marketing and Visibility
        • Financial Intelligence and Commercial Performance
        • Strategy, Growth and Scale
      • Government Workforce Capability
    • Human Development Gateway
      • Inner Development Capability
        • Self-Leadership and Personal Mastery
        • Emotional Intelligence and Inner Resilience
        • Purpose, Meaning and Life Direction
        • Reflective Practice and Conscious Decision-Making
      • Educator Development Capability
        • Instructional Design and Digital Delivery
        • Facilitation and Professional Practice
        • Professional Communication and Relational Leadership
      • Student Development Capability
        • Learning Skills and Academic Capability
        • Student Emotional Intelligence and Self-Regulation
      • Family Development Capability
        • Parenting for Learning and Development
        • Family Safety and Digital Protection
        • Healthy Family and Personal Relationships
    • First Nations Capability Gateway
      • Cultural Authority and Governance
      • Learning Through Country
      • Indigenous Ways of Teaching and Learning
      • Identity, Connection and Community
      • First Nations Leadership and Economic Participation
  • Partner With Us
  • Insights
    • The Capability Journal
    • The Answer is Yes Magazine (coming soon)
  • Social Impact
  • About
    • Our Capability Experts
    • Testimonials

What Our Client Says

Corrina was able to handle anything I threw at her

When I was opening my company I was a little lost in what I needed for compliancy and support. Corrina was able to handle anything I threw at her, from Health and Safety requirements, through to Fire training, and staffing issues. What Corrina brings to the table is a wealth of knowledge and access to… Read more “Corrina was able to handle anything I threw at her”

Von Barnes
Principal of Pinnacle Properties

Corrina made it very clear and easy to understand

I work at a desk all day and I didn’t fully understand or realise the multitude of risks/hazards not only in my workplace but in other industries and sites. Corrina made it very clear and easy to understand

Telia Dwyer,
Design Governess

A very good way to spend an afternoon

Doing Hazard & Risk Assessment Training was A very good way to spend an afternoon -it will start me on a journey I have been planing for a year but failed to start

Mark Bell
Desks Etc

Very well explained

The Hazard & Risk Assessment was very well explained, simple… so that every one understands

Maraia Cookson
In House Printing

Recent Posts

  • The Hidden Cost of Owner Dependency
  • Why Staff Problems Are Usually a System Problem
  • Revenue Growth Doesn’t Fix Profit Problems
  • Customer Service Problems Are Rarely About Attitude
  • Workplace Mental Health Is Shaped by How Work Is Designed

Book a Strategy Session Today to discuss your Training Needs

Book now

menu

  • Home
  • Contact Us
  • Thinking
  • The Capability Pathways
    • Workforce Gateway
      • Leadership Capability
        • Emerging and Frontline Leaders
        • Communication and Influence
        • Team Leadership and Engagement Programs
        • Conflict and Difficult Conversations
        • Performance Conversations
      • People and Culture Capability
        • Workforce Foundations and HR Systems
        • Recruitment and Talent Management
        • Workplace Culture and Ethics
        • Performance and Reward Systems
      • Safety and Wellbeing Capability
        • WHS Foundations and Legal Duties
        • Psychosocial Risk and Mental Health
        • Emergency Preparedness and Response
        • Physical Risk, Chemicals and Manual Handling
        • Menopause and Life Stage Support
      • Organisational Capability
        • Governance and Structural Foundations
        • Project and Change Capability
        • Operational Systems and Process Excellence
      • Digital and Cyber Capability
        • Cyber Awareness and Human Firewall
        • Cyber Governance and Risk
        • Incident Response and Organisational Readiness
        • Secure Infrastructure and Environments
      • Career and Employability Capability
        • Career Foundations and Direction Capability
        • Job Readiness and Employability Skills Capability
        • Career Growth and Advancement
        • Career Transition and Reinvention
        • Coaching and Career Practice Capability
      • Business and Commercial Capability
        • Business Foundations and Entrepreneurship
        • Marketing, Branding and Visibility
        • Sales, Marketing and Visibility
        • Financial Intelligence and Commercial Performance
        • Strategy, Growth and Scale
      • Government Workforce Capability
    • Human Development Gateway
      • Inner Development Capability
        • Self-Leadership and Personal Mastery
        • Emotional Intelligence and Inner Resilience
        • Purpose, Meaning and Life Direction
        • Reflective Practice and Conscious Decision-Making
      • Educator Development Capability
        • Instructional Design and Digital Delivery
        • Facilitation and Professional Practice
        • Professional Communication and Relational Leadership
      • Student Development Capability
        • Learning Skills and Academic Capability
        • Student Emotional Intelligence and Self-Regulation
      • Family Development Capability
        • Parenting for Learning and Development
        • Family Safety and Digital Protection
        • Healthy Family and Personal Relationships
    • First Nations Capability Gateway
      • Cultural Authority and Governance
      • Learning Through Country
      • Indigenous Ways of Teaching and Learning
      • Identity, Connection and Community
      • First Nations Leadership and Economic Participation
  • Partner With Us
  • Insights
    • The Capability Journal
    • The Answer is Yes Magazine (coming soon)
  • Social Impact
  • About
    • Our Capability Experts
    • Testimonials

Contact Information

Queensland, Australia

info@answeryes.com.au

07 3180 4422

Policies

  • Accessibility Statement

  • Australian Privacy Policy

  • Refund and Returns Policy

  • Website and Service Terms

Connect With us

facebook twitter instagram tiktok
  • Home
  • Contact Us
  • Thinking
  • The Capability Pathways
    • Workforce Gateway
      • Leadership Capability
        • Emerging and Frontline Leaders
        • Communication and Influence
        • Team Leadership and Engagement Programs
        • Conflict and Difficult Conversations
        • Performance Conversations
      • People and Culture Capability
        • Workforce Foundations and HR Systems
        • Recruitment and Talent Management
        • Workplace Culture and Ethics
        • Performance and Reward Systems
      • Safety and Wellbeing Capability
        • WHS Foundations and Legal Duties
        • Psychosocial Risk and Mental Health
        • Emergency Preparedness and Response
        • Physical Risk, Chemicals and Manual Handling
        • Menopause and Life Stage Support
      • Organisational Capability
        • Governance and Structural Foundations
        • Project and Change Capability
        • Operational Systems and Process Excellence
      • Digital and Cyber Capability
        • Cyber Awareness and Human Firewall
        • Cyber Governance and Risk
        • Incident Response and Organisational Readiness
        • Secure Infrastructure and Environments
      • Career and Employability Capability
        • Career Foundations and Direction Capability
        • Job Readiness and Employability Skills Capability
        • Career Growth and Advancement
        • Career Transition and Reinvention
        • Coaching and Career Practice Capability
      • Business and Commercial Capability
        • Business Foundations and Entrepreneurship
        • Marketing, Branding and Visibility
        • Sales, Marketing and Visibility
        • Financial Intelligence and Commercial Performance
        • Strategy, Growth and Scale
      • Government Workforce Capability
    • Human Development Gateway
      • Inner Development Capability
        • Self-Leadership and Personal Mastery
        • Emotional Intelligence and Inner Resilience
        • Purpose, Meaning and Life Direction
        • Reflective Practice and Conscious Decision-Making
      • Educator Development Capability
        • Instructional Design and Digital Delivery
        • Facilitation and Professional Practice
        • Professional Communication and Relational Leadership
      • Student Development Capability
        • Learning Skills and Academic Capability
        • Student Emotional Intelligence and Self-Regulation
      • Family Development Capability
        • Parenting for Learning and Development
        • Family Safety and Digital Protection
        • Healthy Family and Personal Relationships
    • First Nations Capability Gateway
      • Cultural Authority and Governance
      • Learning Through Country
      • Indigenous Ways of Teaching and Learning
      • Identity, Connection and Community
      • First Nations Leadership and Economic Participation
  • Partner With Us
  • Insights
    • The Capability Journal
    • The Answer is Yes Magazine (coming soon)
  • Social Impact
  • About
    • Our Capability Experts
    • Testimonials

© 2020 - 2026 The Answer Is Yes.

HAZARDOUS CHEMICALS
SELF-ASSESSMENT CHECKLIST

5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0_5_0

[wpcode id=”23271″]

Total

0/100

0 - 25 - You have serious problem on your site and need to act immediately to rectify the situation or you could find your business heavily fined.

30 - 50 - You need to actively implement your WHS system.

55 - 75 - Something in place but there are areas that need to be addressed.

75 - 95 - Your chemical health and safety system in place.

100 - Well Done!

Book a Meeting with one of our WHS Consultant to discuss how we can help you achieve 100% compliance. 
Book a Virtual Meeting