Home

About Us

IT Services

Understanding IT

Events

Blog

Contact Us

Support

Accucom Blog

Accucom has been serving the Norwest Business Park area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Zero-Day Vulnerability Found in Barracuda’s Email Security

A Zero-Day Vulnerability Found in Barracuda’s Email Security

What happens when the tools designed to keep organizations safe from network breaches, are the victim of a cyberattack? After all, these tools are just applications, albeit sophisticated pieces of security software, they can run the risk of being exploited much in the same way any other software is. This is exactly what happened to cybersecurity giant Barracuda as it was the victim of a zero-day exploit. Let’s take a look at the hack and how you can protect your business from sharing the same fate.

0 Comments
Continue reading

4 Ways to Detect a Phishing Attack

4 Ways to Detect a Phishing Attack

A modern network, when properly configured and protected with modern cybersecurity tools, can be extremely secure. Since that’s been the trend for some organizations over the years, hackers have been looking for ways around the security many businesses have in place. If hackers can’t break in through normal means, they will turn to other, more insidious methods, like phishing attacks, to get what they are after.

0 Comments
Continue reading

Gmail and Google Calendar Add Client-Side Encryption

Gmail and Google Calendar Add Client-Side Encryption

Google is rolling out client-side encryption to Gmail and Calendar, which will allow users to create meeting events as well as send and receive emails that have been encrypted before being sent to Google servers. Client-side encryption will be available to organizations with Google Workspace Enterprise Plus, Education Standard, and Education Plus plans. All other types of Google Workspace accounts and personal Gmail accounts will not get client-side encryption.

0 Comments
Continue reading

FTC Safeguards Rule: What You Need to Know

FTC Safeguards Rule: What You Need to Know

The Federal Trade Commission has developed their Safeguards Rule for one purpose: To set up a guideline on how to interact, store, and use customer information. The FTC enacted the Rule in 2003, but it was heavily amended in 2021 to ensure that it keeps up with the technology used by businesses today. It outlines the policies and procedures that all covered companies need to enact.

0 Comments
Continue reading

Here’s How Fast Your Password Can Be Cracked

Here’s How Fast Your Password Can Be Cracked

Weak passwords are one of the leading causes of cybercrime, identity theft, and data breaches. Sure, it’s easy to say it, but this time we wanted to demonstrate just how easy it is to crack a wimpy password. 

0 Comments
Continue reading

Understanding Enterprise Security Can Improve Your Business’ Training

Understanding Enterprise Security Can Improve Your Business’ Training

For the growing business, doing the right things to secure your network and data is a constantly evolving situation. For larger businesses, they tend to approach the situation with a different perspective. They plan out the whole process. This is what is called enterprise security.  Let’s take a look at what enterprise security entails and how the little guy can benefit from doing things like larger companies do them. 

0 Comments
Continue reading

When It Comes to Protecting Your Business, Your Team Members are a Critical Element

When It Comes to Protecting Your Business, Your Team Members are a Critical Element

Cybersecurity has gradually become more and more of a focus for modern businesses as threats to their data and general operations have mounted over time. This means that businesses need to approach their security with a multifaceted strategy, involving a combination of the right tools and IT support and the training to use them. Let’s take a few moments to dive into security training and why it is so critical.

0 Comments
Continue reading

Strategies to Help You Secure the Data You Have in the Cloud

Strategies to Help You Secure the Data You Have in the Cloud

Most businesses leverage the cloud in at least some capacity, whether cloud-based apps or cloud-based infrastructure. In any case, using the cloud comes with inherent security questions that must be addressed during the planning, implementation, and launch phases of any solution. Let’s go over some of the ways you might protect data and applications stored in the cloud.

0 Comments
Continue reading

What Impact Might Wearable Technology Have on Your Business?

What Impact Might Wearable Technology Have on Your Business?

Wearable technology is all over the place in your office, whether you realize it or not. Consider how many of your employees wear smartwatches or health trackers. All of these devices tend to enrich the lives of those who use them, but they can quickly become network security risks if you aren’t prepared to handle them on your company network. Let’s go over what you need to consider to protect your business from wearable technology.

0 Comments
Continue reading

Getting Suspicious Messages? They Are Probably Phishing Attacks

Getting Suspicious Messages? They Are Probably Phishing Attacks

Phishing is a word that has a couple of different meanings, depending on the spelling and context. Fishing, like the act of sitting down with a pole and trying to catch a fish, can be a relaxing, leisurely activity. Phishing, with a “ph,” is anything but that, and it can be a tiring and scary situation to navigate—particularly if you or one of your employees have fallen victim to an attack.

0 Comments
Continue reading

4 Things You Can Do to Improve Security When You Work From Home

4 Things You Can Do to Improve Security When You Work From Home

Is your business prepared to handle the many challenges that come from remote work, chief among them security? If you aren’t, then the transition to remote or hybrid operations is going to be a rough one, to say the least. Let’s discuss how you can implement secure remote or hybrid work policies that are sure to protect your business now and in the future.

0 Comments
Continue reading

Phishing Can Have Multiple Attack Vectors

Phishing Can Have Multiple Attack Vectors

Phishing is a pressing issue for everyone, not just businesses. The main problem is that the phishing messages keep getting more and more sophisticated and keep coming and coming until, eventually, something negative happens. For this week’s tip, we wanted to discuss the different types of phishing you can encounter. 

0 Comments
Continue reading

Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

Last week, we went through why training is such a crucial part of your business’ cybersecurity process. This week we will turn our attention to some of the tools and other strategies that your organization should be using to mitigate security threats. 

0 Comments
Continue reading

Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

Admit it, you don’t know all that much about cybersecurity. In this blog, we spend a lot of time discussing security issues. After all, today there are more threats than ever and many different types of problems that IT administrators, business decision-makers, and even individual employees have to deal with. Over the next two weeks, we have decided to discuss the reality of cybersecurity and what you need to know to get out in front of it. 

0 Comments
Continue reading

Five of the Worst Security Breaches of 2022

Five of the Worst Security Breaches of 2022

We make a consistent point to urge our readers to take their organizational cybersecurity seriously. This is because there are threats out there that are targeting your business, no matter how small it is. This week, we take a break from the itemized list of security tips to present 2022’s most devastating cyberattacks to give you an idea what hackers today can do.

0 Comments
Continue reading

What is the Difference Between a Security Breach and a Data Breach?

What is the Difference Between a Security Breach and a Data Breach?

In our blog, we talk about security and data breaches all the time. We tell you how you can take efforts to avoid them and how to prepare your organization for the inevitability of being exposed to them. With all that security talk, we should briefly describe the difference between a security breach and a data breach, because they are two different things that get lumped together quite a bit.

0 Comments
Continue reading

What Twitter’s API Breaches Mean for Cybersecurity Trends

What Twitter’s API Breaches Mean for Cybersecurity Trends

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be done to stop them.

0 Comments
Continue reading

Tip of the Week: What to Do to Avoid Malware

Tip of the Week: What to Do to Avoid Malware

We discuss security a lot. It’s really an important issue for businesses and individuals alike. We typically discuss the actions you can take to ensure you are doing all you can to protect your organization’s network and infrastructure from harm. Today, we are going to break down one of the most crucial parts of any cybersecurity setup: the antivirus. 

0 Comments
Continue reading

The Vatican Proves that No One is Immune to Cyberattacks

The Vatican Proves that No One is Immune to Cyberattacks

While it may not be the first target one might think of when it comes to cyberattacks, a recent Distributed Denial of Service (DDoS) attack on the Vatican’s official website only proves that cyberattacks can potentially influence any organization. Let’s consider the situation, as well as what lessons we can all take away from it.

0 Comments
Continue reading

What Exactly is a Zero-Day Exploit?

What Exactly is a Zero-Day Exploit?

There are countless known threats out there that create security headaches for network administrators, but it’s not the known flaws that are the most dangerous; it’s the unknown ones that have even more potential to derail operations, expose sensitive data in security breaches, and end businesses entirely. These zero-day flaws or exploits are extremely important to keep informed about.

0 Comments
Continue reading

Latest Blog

One of the greatest challenges for businesses is how they protect themselves from threats, including both the physical and digital spaces. Worse yet, the responsibility falls on more than just your IT department. Every employee needs to kno...

Contact Us

Learn more about what Accucom
can do for your business.

(02) 8825-5555

Accucom
Unit 25, 11 Brookhollow Avenue
Norwest Business Park, New South Wales 2153

Account Login