Cyber Crime Case Studies australia
Toowoomba is not a stranger to cyber crime. In this post, we present our own cyber crime case studies Australia and in particularly, we demonstrate how what we have done has protected people .
What cyber crime means
In a 21st century society that is dominated by Information and Communication Technology (ICT) many people depend on ICT for their survival. People have computers at home, they use it for online banking or to simply order electronic materials for example.
According to the Australian Federal Police (AFP), cyber crime is:
- crimes directed at computers or other information communications technologies (ICTs) (such as computer intrusions and denial of service attacks), and
- crimes where computers or ICTs are an integral part of an offence (such as online fraud)
Where to report cyber crime in Australia
The AFP advises that if you or your business have been victim of cybercrime that you need to report it to the Australian Cyber Security Centre.
The Australian Government has a website that goes into more detail in relation to what is happening in the country. As a citizen, you can report the following to ReportCyber:
- Identity theft and fraud
- Online fraud
- Cyber-enabled abuse
- Online image abuse
- Affected devices
It is important that you DO NOT report when:
- Court orders have already been issued against the suspect
- Any physical crime has been undertaken such as debit or credit has been stolen. Or when the computer itself has been stolen.
- You have received a scam call, yet you have not had any personal information or money taken.
How can cyber crime be prevented
There are several ways in which you can protect yourself from cyber crime.
Aspire Computing, for example, can installWebroot and we provide our own cyber crime case studies Australia here.
Other ways include:
- Use a full-service internet security suite
- Use strong passwords
- Keep your software updated
- Manage your social media settings
- Strengthen your home network
- Talk to your children about the internet
- Keep up to date on major security breaches
- Take measures to help protect yourself against identity theft
- Know that identity theft can happen anywhere
- Keep an eye on the kids
Cyber Crime Case Studies Australia
The video above highlights one of the most recent cyber crime case studies Australia. In it, it discusses the different scams which have occurred in Australia and what a bank did that was so wrong.
Many scammers send links to pages that look like your bank or something else that is familiar to you.
In this example, the bank did just that to ask for personal information and of course, Martin North, the creator of the video did not follow through and made an official comlaint.
On a more local note, the benefits of you as a customer having installed by Aspire Computing protective software such as WebRoot was made very clear when the other day we we were informed that our warning page popped up for one of our customers.
It was noted that various links were sent to this person which they had clicked. Fortunately, due to the WebRoot system that we had installed those pages were blocked and that person was protected from going any further.
At Aspire Computing, we currently use a device that is known as a UTM (Unified Threat Management) firewall. It monitors, filters and protects all of my network traffic and informs me of problems and access attempts that have been blocked. I would strongly recommend business owners look at this system.
Information as to what is actually going on can be monitored, logged and delivered to technical support personnel by these UTM firewalls. Without getting such devices installed, business owners and managers may have absolutely no idea whatsoever, whether they are being accessed externally (hacked) or not.
Cyber crime is on the upswing and everyone is at risk. All businesses are at risk including small businesses in country towns such as Toowoomba.
B.App.Sc., Cert. Computer Engineering PC Service and Repair
As the owner of Aspire Computing founded in 1999, Chaim Lee has been working for over 20 years as the Leading Computer Technician.
He has a life long interest in electronics, computing, science and technology. He has completed studies and gained qualifications in Applied Science, Computer Repair and Service, Microsoft Installation and Maintenance, Technical Writing, Workplace Training, and Technical Sales Training.