Shane Curries Blog

Return to Business Page





Bar and Pokies Patron Data Potentially Compromised: Alleged Offshore Leak Affecting ClubsNSW, Businesses Advised to Verify and Implement High Encryption Standards.

02/05/24 by Mr Shane Currie

An anonymous group of offshore IT subcontractors have reportedly compromised sensitive private Australian information, including biometrics, facial recognition, drivers license details, and slot machine usage of ClubsNSW patrons

The IT contracting firm servicing ClubsNSW has confirmed that the incident is under investigation.

This article highlights the crucial need for robust encryption practices, prompting businesses to leverage encryption options and seek assistance from qualified local IT professionals like Shane from Shanes Computing and Networking to ensure data is secure and properly managed.

Click here to read the article





Beyond Plug-and-Play: Unleashing the Full Power of Your Network Firewall.

31/03/24 by Mr Shane Currie

This article delves into the critical need for advanced configuration of network firewalls, challenging the "plug-and-play" misconception in today's sophisticated corporate and organizational landscapes.

Through an engaging analogy with a VCR, I reveal that while basic functionality is straightforward, leveraging a firewall's advanced features requires skillful programming.

I explore essential topics like access control lists and intrusion detection systems, and provide examples that detail the risks of inadequate configuration..

Read the full article by clicking the button below.

Click here to read the article







Cyber Criminals are using deepfake AI to replicate business stakeholders in Zoom and MSTeams video conference calls.

13/02/24 by Mr Shane Currie

Cybercriminals are using deepfake AI to replicate business stakeholders in fake Zoom and Microsoft Teams calls, resulting in successful scams that defraud companies of millions

This article discusses the rise of deepfake replicants and emphasizes the need for businesses to safeguard against this threat. It suggests implementing network and application access controls, with a focus on using firewall rules, virtual local area networks (VLAN) and access control lists to mitigate this threat

Shane's Computing and Networking can offer a confidential, no obligation security review and provide actionable insights in protecting your business against the rise of the deapfake replicants

Read the full article by clicking the button below.

Click here to read the article





ACSC Essential 8 Simplified: Leveraging Your Current Microsoft Tech for Maximum Security & Affordably

30/01/24 by Mr Shane Currie

This article highlights cost-effective strategies for small to medium enterprises (SMEs) to comply with the Australian Cyber Security Centre's Essential 8 model using existing Microsoft tools.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article also advices how Shanes Computing and Networking, which offers affordable consultation services can help businesses implement these Essential 8 guidelines effectively.

Read the full article by clicking the button below.

Click here to read the article






2024: Time to Fortify! ASIC Survey Reveals Cyber Security Gaps in SMEs

17/01/24 by Mr Shane Currie

This article highlights ASIC's Cyber Pulse Survey findings, revealing many Australian SMEs' lack of preparedness for cyber threats.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article warns of an expected increase in cybercrime in 2024 and stresses the importance of SMEs fortifying their defenses.

Read the full article by clicking the button below.

Click here to read the article






The Silent War: Protecting MSPs and Clients from Covert Cyber Infiltration

14/12/23 by Mr Shane Currie

This article explores the heightened cybersecurity risks facing Managed Service Providers (MSPs) and their clients, emphasizing the implications of cybercriminal infiltration.

Citing warnings from cybersecurity agencies, the article delves into the specific threat of North Korean cyber criminals masquerading as IT workers to deploy ransomware.

The article advocates for the strategic hiring of local IT professionals and emphasizes proactive measures for clients and MSPs to protect against cyber threats.

Read the full article by clicking the button below.

Click here to read the article






Safeguarding Your Organizations Fortress: The Power of Monitoring TCP/IP & UDP Activity

09/12/23 by Mr Shane Currie

This article emphasizes the critical role of monitoring TCP/IP and UDP activity in safeguarding businesses from cyber threats. it explores the risks associated with remote access, illustrating the potential dangers when network communication channels go unchecked.

Citing real word examples, this article highlights the current vulnerabilities of remote work from home scenarios and how these vulnerabilities can be fortified by professional IT Staff and Contractors skilled in Network Security and Network Engineering.

Read the full article by clicking the button below.

Click here to read the article






Fortify Your Defenses: Unleashing the Power of Microsoft Exchange and SharePoint for Robust Email Security

08/12/23 by Mr Shane Currie

Emails stand out as the primary entry points targeted by cybercriminals. Typically, these malicious actors initiate attacks on businesses or organizations by deploying deceptive emails aimed at misleading staff.

This article delves into the deployment of disclaimers, email attachment blocking and review mechanisms using Microsoft Exchange. Additionally, it explores the inclusion of a Cyber Security Policy in SharePoint as a means to educate staff

Read the full article by clicking the button below.

Click here to read the article




Safeguard Your Business: Choose Local Australian IT Support Over Risky International Alternatives

23/11/23 by Mr Shane Currie

In the current political and business landscape of Australia, businesses and organizations must decide between outsourcing IT support services or employing Australian-trained IT support staff and contractors.

This article objectively explores the security risks associated with outsourcing IT support and highlights the benefits of choosing Australian-based IT support for your business or organization.

Read the full article by clicking the button below.

Click here to read the article