Security

Tip – Privacy and information sharing requirements for the Online TLDS

Early childhood educators working on Transition Learning and Development Statements are required to adhere to their service’s privacy policies in the handling of personal information. Schools must adhere to the Victorian privacy laws and Federal laws for other agencies and non-government bodies. The Department of Education and Training have an information page providing guidance on

Tip – Optus Data Breach

Reported widely in the press this week, both state and national agencies are providing an evolving response to the Optus data breach. Optus customers and former customers who received notification from Optus can find guidance from the OAIC and IDCARE. Although it is uncertain if all the data was publicly leaked, security specialists advise that

Tip – Phishing email targeting early childhood services

Targeted phishing emails are currently being sent to registered services. Below is an example: ACECQA have responded and instructed recipients: This is NOT an official email from ACECQA. It is a spam email that should be deleted - do not click on the link. If you did click on the link in the spam email

Virus alert ‘Deadbolt’ ransomware targeting network attached storage

We have had reports of the 'Deadbolt' ransomware affecting kindergartens. The Deadbolt ransomware targets computers and networked attached storage (NAS).  Just like your computer, NAS devices should be kept secure by running security updates and turning off vulnerabilities. If your service has a network attached storage device such as a QNAP or other storage device,

Scam text messages

Scam texts are fake messages with links that can target Androids, iPhones or any other smartphone. Scammers can appear to be sending from legitimate phone numbers or even among messages from other contacts. Although they are constantly changing examples regularly include…   claims of a missed call with a link to voicemail [FAKE]   claims

Scam phone calls

Phone scam calls can occur to both home or business numbers and within business hours or outside. The callers may be human or automated (robocalls). What they want Phone scammers aim to harvest information and to gain access to systems for further exploitation. If they see an opportunity to escalate the attack, they will. For

Password best practice and Password Managers

Best practice for any important online account is to use a unique, complex random password and to update it periodically.  This can be an inconvenient demand if you have many passwords memorised but becomes easy with a Password Manager.   What is a Password Manager? An App or feature that records, stores then auto-fills usernames

Phishing email attacks and socially engineered messages

Both individuals and organisations are regularly targeted by criminals attempting to collect confidential information and accounts. Phishing attacks are a common method used by online scammers to fool you into giving out private information or tricking you into entering your information or passwords into fake websites. Phishing emails and messages try to look genuine, and

First steps in response to ransomware

How do I know I have been attacked by ransomware? The first sign may be a “ransom letter” appearing in a new text file, your browser or desktop created by the ransomware alerting you to on-going damage with instructions and threats. Your work files may appear corrupted or unusable. How did I get attacked? Ransomware

How to take precautions against ransomware

Ransomware is malicious software that encrypts files on a victim’s device or drives. The encrypted files are then unusable to anyone without the encryption key. Once the attack starts the ransomware warns the victim on how to pay a ransom in order to unlock their data. The cyber criminals may also threaten to expose or

Go to Top