<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">

	<channel>
		<title><![CDATA[ICT Insight | Darwin Blog - Articles - Security]]></title>
		<link>https://www.itblog.com.au</link>
		<description><![CDATA[Technology blog site for Darwin and Northern Territory based companies to read about technology without all the heavy technical details. We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology and Communications in the workplace. Topics that we will cover, SPAM, Exploits, Security, CCTV General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.]]></description>
		<language>en-us</language>
		<copyright><![CDATA[https://www.itblog.com.au]]></copyright>
		<generator>N/A</generator>
		<webMaster>help@web365.com.au</webMaster>
		<lastBuildDate>Mon, 02 Mar 2020 20:46:58 ACST</lastBuildDate>
		<ttl>20</ttl>
		<item>
			<title><![CDATA[Internet Reputation]]></title>
			<link>https://www.itblog.com.au/articles/19/1/Internet-Reputation/Page1.html</link>
			<description><![CDATA[<p>Remember when you were in school, there was always someone that their reputation came before them and not always in a good way..</p>
<p>Well much like school the internet has the same thing and a much longer memory.</p>
<p>If your PC or mail server gets hacked and sends tens of thousands of emails the public IP address of your internet connection will get a bad reputation to the point other systems may not accept email from you.</p>
<p>Your public facing Website may get hacked and hidden pages are created that can be used for delivering malicious content via the emails I have warned you not to open.</p>
<p>These types of issues can be very harmful to your Internet Reputation which will impact access to sites, email and a number of things you depend on daily.&nbsp; Many smart firewalls will now simply block connections to sites purely based on reputation scoring.</p>
<p>Sites such as the below are used to check how your IP Address, Email Domain and WebPages appear to the outside world, many you can subscribe to for automatic alerting if you are added and it is key to protecting your Internet Reputation;</p>
<p>WatchGuard Reputation Enabled Defense - Firewall based reporting &amp; blocking for IP Addresses, Countries (Geo) and Content.<br /><a>http://www.reputationauthority.org/</a></p>
<p>SPAM Database lookup - Check to see if your IP Address is listed a SPAM Sender.<br /><a href="https://www.dnsbl.info/dnsbl-details.php">https://www.dnsbl.info/dnsbl-details.php</a><br /><a href="http://www.mxtoolbox.com">http://www.mxtoolbox.com</a></p>
<p>BrightCloud Threat Intelligence - Website &amp; Content Reputation<br /><a href="http://www.brightcloud.com/tools/url-ip-lookup.php">http://www.brightcloud.com/tools/url-ip-lookup.php</a></p>
<p>There are lots more ways to check, this is to provide a snippet of what can prevent you accessing or emailing content.</p>
<p>Contact us further if you need assistance in checking your Internet Reputation - helpme@itblog.com.au</p>
<p></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Sun, 04 Feb 2018 12:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/19/1/Internet-Reputation/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[SMS Phishing]]></title>
			<link>https://www.itblog.com.au/articles/17/1/SMS-Phishing/Page1.html</link>
			<description><![CDATA[<p><strong>Phishing - </strong>(the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.)</p>
<p>Phishing is not just limited to emails. Many cyber criminals are now phishing people via text message.<br /><br />People more likely to click on a link in an SMS than they are in an email- it feels more personal and intended for them.<br /><br /></p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/SMSPhising.JPG" alt="SMS Phishing" constrain="true" /></p>
<p>In some cases we have seen malware / malicious applications delivered using this method.&nbsp;</p>
<p>The phone is then hijacked and the hackers monitor access to accounts such as online banking and then logon using your credentials.</p>
<p>To prevent this you need to check the content for validity, remember the Banks, Government and other Large Corporates will not as for personal details via SMSM.</p>
<p>Virus protection should also be installed on your mobile devices.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 24 Jan 2018 08:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/17/1/SMS-Phishing/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[Privacy Changes]]></title>
			<link>https://www.itblog.com.au/articles/14/1/Privacy-Changes/Page1.html</link>
			<description><![CDATA[PRIVACY CHANGES<br /><br />Data breach notification will become mandatory as of February 2018 for all Australian entities required to comply with the Privacy Act 1988. When Federal Parliament passed the Privacy Amendment (Notifiable Data Breaches) Act 2017 last year, it started a process that means from February 22, 2018, all entities covered by the Australian Privacy Principles will have clear obligations to report eligible data breaches within 30 days. If an eligible data breach is confirmed, entities must provide a statement to each of the individuals whose data was breached or who are at risk, and notify the Office of the Australian Information Commissioner (OAIC).<br /><br /><br />]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Tue, 02 Jan 2018 06:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/14/1/Privacy-Changes/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[SSL Protected Websites, What and Why ?]]></title>
			<link>https://www.itblog.com.au/articles/13/1/SSL-Protected-Websites-What-and-Why-/Page1.html</link>
			<description><![CDATA[<p><strong>Why HTTPS Should Be Enabled on Your Website</strong></p>
<p><strong>It&rsquo;s good for search.</strong><br />Google&rsquo;s algorithm requires sites to essentially battle it for top search rankings, two websites that could both rank for a user&rsquo;s query, essentially running toward the finish line of top results. <br />But what happens if there&rsquo;s a tie? Do the sites battle it out in a &ldquo;sudden death&rdquo; round?<br />It all goes back to the idea that Google is constantly solving for the user, and makes frequent changes to its algorithm that create a better experience. Which is why our next point makes sense.<br /><br /><strong>It&rsquo;s better for users.</strong><br />SSL helps to prevent these &ldquo;man-in-the-middle&rdquo; attacks -- &ldquo;a form of eavesdropping where communication between two users is monitored and modified by an unauthorised party&rdquo; -- and keeps user information secure.<br /><br />That makes https especially important if your website accepts credit cards or has a login functionality. With so many of these hacking incidents making headlines, users want to know that your brand is making an effort to protect them from their private information being stolen or compromised.<br /><br />user privacy = important<br />https = good for privacy<br /><br /><strong>SSL is required for AMP</strong>.<br />A few pieces of vocabulary to break down here:<br /><br />&ldquo;AMP&rdquo; stands for Accelerated Mobile Pages. It&rsquo;s the technology that makes certain pages load almost instantaneously on mobile. So, when you search for something on your mobile device through Google, you might notice that some results have a lightning bolt icon next to it, that means that it&rsquo;s AMP-ready.<br /><br /></p>
<p><strong>Google is indexing mobile.</strong><br />So, that thing we just said about the importance of mobile? It turns out, Google is actually going to start indexing mobile, which means that its &ldquo;algorithms will eventually primarily use the mobile version of a site&rsquo;s content to rank pages from that site.&rdquo;<br />But in order for a mobile site to be indexable, Google recommends several best practices, one of which is to &ldquo;start by migrating to a secure site,&rdquo; especially &ldquo;if [you] don&rsquo;t support HTTPS yet.&rdquo;<br /><br /><strong>Not secure.</strong><br />To elaborate -- In 2017, Chrome 56 will start displaying &ldquo;not secure&rdquo; in the browser bar for any http (notice it&rsquo;s missing the &ldquo;s&rdquo;) sites that ask users for login or credit card information.<br /><br />I don&rsquo;t know about you, but when I&rsquo;m about to make an online purchase and see that the site isn&rsquo;t secure -- for example, that the padlock icon in the browser bar is broken -- I navigate my business elsewhere. And I&rsquo;m not alone. In fact, only 3% of online shoppers say they would enter their credit card information on a site without the green padlock.<br /><br />Imagine if Google starts doing that work for users before they can even get to checkout. If the number is as low as 3% now, before search engines start doing the legwork to label sites as &ldquo;not secure&rdquo; before anyone even visits them, you can see how traffic to those sites will suffer a huge blow -- as well as its digital sales revenue.</p>
<p>The long and the short of all the above is you need for your web site provider / developer to update your site, purchase a SSL Certificate and secure your website, don't act and miss out...</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Thu, 28 Dec 2017 12:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/13/1/SSL-Protected-Websites-What-and-Why-/Page1.html</guid>
		</item>
	</channel>
</rss>