Which training course can you most benefit from?

If you've been to university in the past two decades, you can attest to the number of individuals who find themselves confused or lost by choosing the wrong training course or degree. Despite this, employers and students alike still place great significance on acquiring a qualification to prove their ability. 

There are a range of certification options available in almost any career, but IT training will always benefit individuals with unique and diverse skill sets. Any individual or business that values specificity and competency in their work will know the improvements that well-designed training courses can bring. 

ALC offers a selectively designed program to ensure that all trainees return to their jobs able to make an impressionable and instant difference to their role. So, which training course is right for you? 

Choosing the right IT training course can greatly benefit your career.Choosing the right IT training course can greatly benefit your career.

Below, we'll take a look at the selection of courses provided by ALC Training across three of their five key areas.

ITIL is an essential qualification for those wishing to make a difference in IT service management.

IT Service Management

The Information Technology Infrastructure Library (ITIL) is an IT Service Management framework, an essential qualification for those wishing to make a difference in IT service management. The foundation course covers a number of areas to help you learn the fundamental features of ITIL and prepare for the foundation certificate exam.

The 3-day training comprehensively details all foundation subjects – from the history of ITIL itself through to service management, strategy and design and much more. The foundation course finishes with an ITIL certification exam and its relation to other key training areas, including:

Further ITIL training is also offered, with the ITIL Expert qualification awarded to those who successfully complete the range of training modules. 

Project, Programme and Portfolio Management

PRINCE2 training can offer a number of benefits to team project management – whether it's aiding the clear communication between a team, integrating client requests into an existing project or bringing on new staff to a project. 

The 5-day foundation and practitioner course provides effective training for those who wish to grasp the key concepts and frameworks of PRINCE2 while also gaining recognised qualifications. 

The first part of the course covers the seven principles, themes and processes of PRINCE2, with the second half committed to the implementation of PRINCE2 and management of a project – with practitioner certification held at the closing of the course. 

SABSA training provides improved competency in business-driven security strategy and architecture.

Information Security

ALC offers a diverse array of information security training courses, including SABSA, CISSP, CRISC, ISO 27001 and CISM.

Whether you want SABSA training for improved competency in business-driven security strategy and architecture, or ISO 27001 certification gained from practical teaching, ALC Training can provide a structured career path. 

These courses aren't limited to network administrators or engineers, however. The Information Security for Executives presentation uses pertinent scenarios to help those in higher positions better understand the roles and challenges of security professionals. 

For those with a large roster of staff, the Information Security Awareness Program addresses social engineering – the use of humans as manipulatable targets for hackers – and can be incredibly effective in identifying malicious cyber-tactics. 

ALC Training from foundation to expert

ALC is a supplier of expert training and services for businesses and individuals – able to provide and implement effective IT solutions. ALC Training courses are designed to equip professionals with the skills needed to make an immediate difference in their role. 

With classes offered in New Zealand, Australia and areas of Southeast Asia, now is a great time to get in touch with ALC Training and find out how specialised courses can help you take the next step in your IT career.

Social engineering alert signs you should be aware of

Australians lost almost half a billion dollars to scammers in 2018 according to the latest figures in the ACCC’s Targeting Scams report. Australian businesses are also being targeted by sophisticated ‘business email compromise scams’ with reports of losses to Scamwatch and other agencies exceeding $60 million in 2018. View more statistics

The techniques of cybercrime are evolving to include the programming of human beings, through social engineering techniques employed to gain access to your company.

Identify and report suspicious behaviour before it can compromise a network.

Understanding social engineering

Social engineering is a technique employed by criminals to obtain classified or confidential information.

The methods used to trick information from the target are almost as varied as the types of information gained; hackers will find a use for almost anything. 

A report released by Symantec showed that real names, social security numbers and dates of birth were the three types of information breached most often. The remaining six cover emails, usernames and passwords, as well as addresses, medical records, insurance details and financial information. 

It would seem that there isn’t much that hackers can’t make use of, which could prompt many of us to feel that the only solution is to unplug our modem and live in a cave. Thankfully, the world of information security training has proved more than capable of meeting the demands set by hackers.

Fighting the good fight

Nobody wants to let fear control them, in the same way that a business should have confidence in its employees’ abilities. Whether this be the most complex of IT security procedures or simply knowing if an attachment is safe, every interaction is important. 

The ability to identify and report suspicious behaviour before it can compromise a network can be crucial to the long-term health of your business. Below are a few alert signs that every employee, and employer, can benefit from looking out for today.

A good rule of thumb

As a general rule, if it looks too good to be true, or like a scam, then chances are it is.

Use common sense before opening external links, downloading attachments, or thinking about putting anything onto a work computer.

ALC Training offers expert information security training, designed to help your employees learn the best and safest online practices. Reach out to us today, and find out how effective training can prevent cyberattacks before they happen. 

Don’t let your employees be the weakest link in your network chain.

 

 

 

The escalating incidents of financial cybercrime

On November 8, 2008, the world of financial cybercrime changed forever.

According to the Federal Bureau of Investigation (FBI), within the space of just 12 hours a team of hackers and 'cashers' – thieves employed by the hackers – targeted more than 2,100 automated teller machines (ATM) worldwide. After the electronic dust had settled, the amount of stolen funds exceeded US $9 million.

A year later, the FBI Cyber Division commented on the heist.

"It was a highly sophisticated and cleverly orchestrated crime plot," they wrote, "and unlike any we've ever seen before."

So how exactly did a team of only three 20-something European hackers in separate countries manage to pull off an attack that redefined cybercrime?

"The end user remains the weakest link in the chain during an online transaction."

The timeline of the attack

When a Moldova-based hacker discovered an exploit that enabled him to access the computer network of a credit card company, he forwarded this information to an Estonian hacker.

After investigating the weakness of the network to the exploit, the Estonian passed this information to another hacker based in Russia.

With the exploit tested, the Russian and a small team of associates compromised the network of the credit card company and began raising the withdrawal limits of prepaid payroll debit cards. After the limits had been set and card PIN codes reverse-engineered from the network, the hackers deployed their team of cashers to extract the funds from over 2,000 ATMs.

Just 12 hours later, and using only 44 cards in total, the criminal team walked away with the staggering $9 million sum.

Financial cybercrime rises

While 2008 marked the moment that cybercrime on a worldwide scale was brought to the public attention, the following years only showed an increase in financial institutions being compromised.

Recent news reports show that hackers are no longer looking at figures in the millions as a challenge. One event in Bangladesh saw a spelling error stop hackers in their tracks: the spelling of 'foundation' as 'fandation' prevented cybercriminals from stealing over US $1 billion.

With this in mind, the approach toward information security training needed to evolve with the methods employed by hackers. 

In February 2016, the Australian Communications and Media Authority (ACMA) released a warning to users of online banking software and applications indicating that hackers were using fake SMS messages to trick individuals into revealing sensitive information.

One of the most effective ways to protect yourself is to understand the use of social engineering, and how hackers deploy this tactic when committing cybercrime. 

Identifying social engineering techniques can keep your money safe.Identifying social engineering techniques can keep you safe from cybercrime.

The rise of social engineering

According to a report released by Symantec Security Systems, the number of financial malware software or trojans that were detected in 2015 decreased from 2014 by over 70 per cent. While the exact reasoning behind this remains of a mystery, improved security software has resulted in technical exploits becoming less and less viable. So who or what is the biggest risk? 

"The end user remains the weakest link in the chain during an online transaction," the Symantec report says.

Social engineering, or the psychological manipulation of another human to have them perform an action or reveal information, is one of the most effective methods used by hackers and cybercriminals in their mission to extract information or gain access to a network. 

ALC Training offers its Information Security Awareness Programme, a unique training course covering social engineering, identity theft and email-based threats including worms and viruses in attachments.

Ensuring the online security of your employees is crucial to the success and health of your network. The appropriate IT training security training course can arm your company with the tools needed to identify a cyberattack before it can compromise your system.

For more information on our information security programmes along with our extensive range of ITIL, COBIT 5 and PRINCE2 courses, reach out to ALC Training today. 

Cybersecurity: Is space the final frontier?

When most people think of cybersecurity, their minds tend to imagine a hacked iPhone, email or even company servers. However, as those with information security training know, there is an new area of cybersecurity that is literally taking off.

Think about this: How does all the data that populates mobile technology, email services, credit cards and even healthcare records circulate? If you answered deep sea cables, you would be partially right. Yet, what we are getting at is space.

Is space the new frontier for those with information security training?

Growing satellite market presents new risks

Satellites, and all the equipment and expertise that goes into launching one, is huge growth industry. In 30 years, it has grown from only a few superpowers to an environment where private entities now have the ability to launch private payloads.

Figures from the Satellite Industry Association show that in 2014 global revenues totaled over US$200 billion, with satellite services comprising US$122.9 billion and ground equipment another US$58.3 billion. The industry has grown 4 per cent in 2014 and is expected to expand further in the near future. 

There are thousands of satellites orbiting the earth and many more are being launched every year. This has been driven by the increasing use of technology to reduce the size of launch packages, which cost less and are significantly lighter – making it easier to launch. 

Alongside the changes in size and cost, the purpose of satellites has also changed. Today, the focus is on maintaining a network of information flows and as such, there is a huge volume of both up and down links as well as other bands. 

This combination has forced cybersecurity expertise to push reset on their approaches to data security. New forms of data are flowing in and out of modern communications satellite, for example voice and video. There are rivers of information flowing from every satellite, ground station and everything in between. 

The flow of data from satellites is a prime target for hackers.The flow of data from satellites is a prime target for hackers.

Identifying weak points in security protocols

Satellites have become a major target for groups of hackers and governments taking part in cyber war efforts. As such, organisations are looking to people with the right expertise, such as those that have attended information security training courses, to find new ways to overcome these obstacles. 

One example of a weak point is people on the ground and the growing trend of BYOD (or bring your own device). In many cases, hackers are using the social engineering approach to hacking in an effort to use psychology against them. They are creating matrixes out of people's pictures, social media posts and location tags, which can give hackers an idea about organisational patterns and security procedures.

Another pain point for cybersecurity in relation to satellites is the overly outdated procedures, processes and protocols in place that aim to protect sensitive information. In today's world, data is being transferred at an incredible rate and is being sourced and implemented in ways that were unbelievable even a decade ago. These outdated protocols are not up to the task of managing this data flow and identifying where and when a hack could take place. 

As a result of this, companies and public entities are looking for personnel who can rewrite the security scripts that manage satellites to ensure data is secure and safe. This means revising strategic plans, and identifying touch points that are vulnerable to both internal and external forces. 

However, to capitalise on these employment opportunities, it is essential to have the right training and obtain the necessary knowledge needed to fill these roles. One way to achieve this is through an experienced and professional training provider. At ALC Training, we have a number of training courses that can make sure you have the skills to get the job done. 

Make sure you contact ALC Training today to find out more. 

Do you know how to make your business cyber resilient?

Australian organisations continue to experience cyberattacks that have the potential to severely impact and disrupt business operations and customer value. While information security training courses can help employees address threats, many organisations are without these expertise. As such, a vast segment of these threats go undetected or are identified too late for a business to react effectively.

To address these threats, businesses need to be properly prepared. But many in Australia are unaware of what this entails. This has been compounded by the ever-changing cybersecurity landscape that sees new malware every week and continuously evolving cyberstrategies. As such, it is essential that companies do not only prepare for what they know is a threat but also endeavour to be ready for unseen cyberdangers.

Information security training courses are essential to ensuring a company’s information is safe and secure.

To help organisational leaders understand what they need to do, here are three fundamental steps when preparing for cyberattacks in today’s digital age.

Step 1 – Know your assets

In the face of an ever growing array of more complex hacker tools, the budget limitations facing companies are becoming increasingly salient. But cyber-related attacks are not going away, and the recent Australian budget highlights this, with the government investing over $200 million into its Cyber Security Strategy.

Unlike the government, most Australian organisations do not have a blank check to throw at cybersecurity, instead, they must think strategically. Most importantly, organisational leaders must identify the assets they need to protect and pinpoint the investments that can protect them. 

Through a process of identification, an organisation can prioritise security areas that need investment as well as the security requirements for third parties that host your data. However, it is important to ensure you do not overlook the value of certain systems and processes. Take for instance, the normal administration systems. While many might view this as of little value, if your internal and external communication system is taken down, an organisation may be unable to engage with key stakeholders such as suppliers and customers. 

Step 2 – Identify and analyse your cyberrisk

After defining your key assets, the second step is accessing your cyberrisk. This involves using technology, processes and personnel with information security training to develop a situational awareness of the types of risks your company faces. 

Building a strategic plan based on these three factors can help maintain the confidentiality, integrity and availability of your informational assets. On the other hand, it is also essential to be aware of the specific risks that face your industry. For example, Australia’s medical sector has been presented with a number of unique challenges that require distinct approaches.

According to PricewaterhouseCoopers, the rise of telemedicine, social media and mobile sharing has transformed the relationships between businesses and their customers. It has also made a significant segment of patient data accessible online, which has ushered in new cybersecurity risks.

Making sure security is a prime focus is essential. Making sure security is a prime focus is essential.

Step 3 – Make awareness and hygiene a priority

To ensure that your assets and the specific risks that face your company are dealt with correctly, the first step is identifying internal risks. 

One of the most important factors to this is employee hygiene. This refers to making sure employees are aware of the sensitive information they have access to and their role in protecting it.

One way to accomplish this is through proactive and ongoing training. Educating staff on how to respond to an incident can mitigate the effects of a cyberattack. They should know who to call, who is authorised to speak for the company and what role they will play in the following investigation. 

Fortunately, training providers such as ALC Training can help deliver best practice workshops that can help employees meet the basic requirements of cybersecurity hygiene. If you would like to know more, talk to a representative today. 

How to achieve happier workers with IT

Employee engagement and satisfaction is constant concern for many businesses. A happier workforce has the potential to be more productive, and can also result in a reduced employee turnover. As such, employers are often searching for new ways improve the satisfaction of their workers.

Research is showing that IT can actually be used to help make employees happier in their jobs, with adoption enhanced through ITIL training. Here are some ways to promote satisfaction by integrating technology into your business, and promoting the success of the company as a result.

Innovative technology is at the top of employees' hierarchy of needs.

1. Adopt advanced technological resources

With technology constantly developing and improving, employees are expecting to be able to use better and better technology while at work.

A 2013 report by Deloitte Access Economics reveals there is "digital hierarchy of needs" that reflects what employees want from their work environment in terms of IT. At the top of the hierarchy is access to innovative technologies, followed by having tech that is reliable, and lastly basic concerns such as pay. This demonstrates the level of importance that employees are placing on the technological resources that are available to them in a job. 

In an interview with SmartCompany, Deloitte Access Economics' Associate Director John O'Mahony said that these days workers have higher expectations of tech and IT and work, and can be discontented when it is not as good as what they have at home.

"When they get to work, they're taking a step back and that's creating frustration, or disappointment," he said.

Consequently, maintaining available technology at a high standard and embracing innovations is key to keeping employees happy.

The cloud can be used to provide flexible work to employees.The cloud can be used to provide flexible work to employees.

2. Use cloud infrastructure for flexibility and mobility

Similarly, the Deloitte report showed that having flexible IT policies significantly impact worker satisfaction. Of employees that reported being happy with their job, over 80 per cent were allowed flexible use of IT, such as using technology to work from home.

"It's not just that people have a good device at home, and at work. People are expecting that working isn't just going to be at a desk with an average computer. There needs to be generally more flexibility within the company's IT as a whole," said Mr O'Mahony.

An integral part of allowing employees flexibility at work is integrating cloud services to make company information mobile and accessible. However, successful cloud adoption is dependent on having the skills in the company to manage the infrastructure. According to a 2016 report by RightScale, a lack of resources or expertise is the most pressing cloud challenge for businesses. Luckily, training courses like TOGAF can be effective in helping professionals use IT resources in their enterprise architecture to improve business efficiency.

The rate of cyber incidents has increased by 38 per cent from 2014-2015.

3. Protect data with security precautions

Lastly, keeping employees happy is affected by giving them assurance that their personal information, as well as that of the company, is secure and being adequately protected. 

A 2016 survey by PricewaterhouseCoopers reported that there was a 38 per cent increase in cyber incidents between 2014 and 2015. This demonstrates that cybersecurity is an increasingly prominent issue for businesses.

Of the businesses surveyed, 53 per cent had an employee training and awareness program, showing that one way to improve both general satisfaction and company data protection is by providing good IT security training for workers. This helps to promote cyber threat awareness, allowing employees to actively participate in security measures. 

Overall, the effective implementation of IT and technology can go a long way to helping employees be more satisfied at work, and consequently help to boost their motivation and efficiency. 

For more information on the types of training to improve the way your business managers its IT, contact ALC Training today.

3 cyberattacks that simple technology could have prevented

When people think of cybersecurity, they tend to imagine complex systems composed of advanced software and sophisticated hardware. Yet, as those who have attended information security training have shown, sometimes it is the simplest of actions that could have prevented disaster.

To reinforce this point, here are three cyberattacks that could have easily been avoided if the simplest of measures were properly implemented.

Could IT security training have prevented these cyberattacks?

1 – Vtech attack

One of the most important benefits of PRINCE2 training is the systematic implementation of a project rollout. However, in this first breach, cybersecurity personal overlooked one of the most important resources – humans.

Vtech is one of the biggest toy manufacturing companies in the world, which makes it a strange target for a cyberattack. As a result of the hack, millions of people had their information stolen, or at the very least compromised.

CNBC reported that over 6.4 million kids were exposed because of the breach, and according to Cybersecurity Analyst Troy Hunt, the password encryption used was not up to best practice.  

"It's just a straight MD5 hash, not even an attempt at salting or using a decent hashing algorithm," he said.

While simple encryption does have it uses, when it comes to customer data, it is important to ensure that information is unreadable – just in case a breach does occur. 

2 – Ashley Madison hack

Cybersecurity breaches are not only about financial loss, many have the affect of changing the lives of people forever. The Ashley Madison breach is one clear example of this scenario. 

Not only was the breach highly publicised, the very nature of the website made any leak of personal information life-changing for those affected. Additionally, the hack will no doubt have damaged the company's brand, almost irredeemably. 

The Guardian reported the company that ran the site boasted it had over 37 million members worldwide, while the service they offered was anonymous and 100 per cent discreet. 

One of the major reasons for the hack was sloppy password protection. According to Vice , the hackers behind the breach said it was too easy to get access. 

"Nobody was watching. No security. Only thing was segmented network. You could use Pass1234 from the internet to VPN to root on all servers," they said. 

How could simple fixes have stopped these breaches. How could simple fixes have stopped these breaches?

3 – CIA Breach

In 2015, CIA director John Brennan's private account was hacked by a teenager. But how could a top executive's account from one of the world's most advanced security organisations be breached by a teenager? 

As it turned out, the hacker masqueraded as a Verizon worker to trick another employee into revealing the spy chief's personal information. While phishing is a dangerous form of cyberattack, it is also easily preventable. 

Simple cybersecurity hygiene can make a huge difference to the likelihood of a breach. For those who have attended information security training courses, setting up systems that ensure a culture of awareness is an obvious first step in any cybersecurity plan. 

As a result of this oversight, the hacker was able to access the director's AOL account, which was being used to store sensitive documents – including a 47-page SF-86 application that is used to attain high-level government security clearance.

What these hacks and breaches show is that cybersecurity is an important part of the modern world. As the globe continues its push to be completely digital, there will be a number of employment opportunities in the sector. 

If you would like to know more about cybersecurity and how you can take advantage to push your career forward, talk to the experts at ALC Training today

Could smartphones be the answer to the gender gap?

Let's not beat around the proverbial bush, the internet has transformed the lives of literally billions of people. It has opened up a number of new potential employment opportunities through quality IT security training and other such courses. Unfortunately, not everyone has equal access to technology, which is having a major impact on social equality.

Qualifications, such as ITIL certification, are opening up new avenues of employment.

Yet, could the simple smartphone be the answer to the gender gap?

Smart phone use down for women

A new study by the Pew Research Centre found disparities exist in smartphone ownership and pointed out that male users outnumbered female users in nearly half of all the countries studied.

The survey was conducted in 40 countries with Mexico, Nigeria, Kenya and Ghana accounting for the most significant disparities. Yet, there were also gaps in developed countries such as the UK and Germany – although the inequality was less severe.

But why are these statistics so important and how could the smart phone help women close the gap?

How does the internet empower women?How does the internet empower women?

Improving access to the internet a game changer

A 2013 report from Intel showed that close to 25 per cent fewer women have access to the world wide web than their male counterparts. For countries in Sub-Saharan Africa, this soars to nearly 45 per cent. Yet, even in the advanced economic centres of the world – such as Europe – similar gaps are visible. For instance, in parts of the EU, the disparity between women is close to 30 per cent. 

In higher-income countries such as France and the United States, women tend to exceed men in internet usage. The report argues that just having access to the Internet can improve a women's income and inspire them to greater heights

Specifically, throughout the surveyed countries, close to half of the female respondents said they use the internet to both search and apply for jobs – while 30 per cent use the internet to develop additional income streams. 

Smartphones are a great way to access the internet and attain the benefits it can offer. By increasing the number of smartphones in the hands of women both at work in their personal life, could make a difference the gender pay gap.

Technology and access to the internet is more than just a place to play games, it can also generate new revenue streams and increase a person's sense of empowerment. If you would like to find out how you can capitalise on the advancement of technology, talk to the experts at ALC Training.  

IT security training more than a private affair

Risk management of cybersecurity threats is one of the most important processes that executives engage with. In an effort to take advantage, managers are seeking IT security training that offers the skills to frame cybersecurity issues through risk management terms.

By doing this, managers can better justify their commercial decisions and close the gaps among risk tolerance, business goals and cybersecurity initiatives. 

Cybersecurity is a fast growing industry, how can you take advantage?

More government agencies focusing on private cloud

Improvements in cloud technology are allowing it to become a more viable option for public institutions than previous renditions of the technology allowed. One such example is the rise of public cloud platforms, yet, cybersecurity is still a major concern.

According to a release by Gartner, IT security will drive government agencies to adopt cloud computing in 2016. The digital giant argues that the benefits of adopting public cloud technology will allow government platforms to perform better and meet the increasingly high expectations for value.

One of the major predictions outlined in the report is that IT security will overtake cost-savings and agile management practices as the major attraction to move to public clouds.

Neville Cannon, research director at Gartner, said that public cloud providers are able to better invest IT security and cloud technology than a nation's budget can afford – let alone the individual budgets of government departments.

"Many cloud service providers, such as Amazon Web Services, Microsoft and Google, invest heavily in incorporating higher levels of security into their products to continue building confidence that their data is more secure," he said.

How can COBIT 5 help your cybersecurity protocols?How can COBIT 5 help your cybersecurity protocols?

Capitalising on the security rush

In the same way quality PRINCE2 training courses have become a major pathway to employment opportunities, IT security training offers participants a great way to become a valuable asset to organisations and companies around the world.

One certification currently on offer is the Implementing NIST Cybersecurity Framework using COBIT 5. 

While there is a range of benefits to this course, one of the most important is the ability to speak to executives. As the commercial world continues to value risk management and directors continue to deploy the risk-related language, this course offers participants the ability to speak to this important group. 

Using COBIT 5 training to implement the NIST Cybersecurity Framework can help your organisation secure and safeguard its sensitive information and develop an action plan in the event of a breach. 

If you would like to know more about cybersecurity training and risk management, talk to ALC Training today and find out how they can help you accomplish your career objectives. 

Criminal syndicates and cybersecurity: How to manage organisational risk

The internet is increasingly becoming the main platform over which organisations deliver goods and services. According to the Australian government, at the end of 2014 the country had more than 12.6 million internet subscribers.

However, as so many people use the internet, it has also become a medium increasingly utilised by criminals in order to access a business's information. One way to avoid this is through information security training courses for both individuals and organisations. Utilising best practice here can mean the difference between an information breach or a secure network. 

The internet is also a medium increasingly used by criminals in order to access a business's information.

Digital threats to Australian companies

A recent survey by Ernst & Young (EY) found that just under 80 per cent of Australian companies believed that a criminal syndicate would be the next source of a cyberattack against their organisation. 

EY's "Creating trust in the digital world" survey found that, alongside criminal syndicates, respondents believed hacktivists, employees and state-sponsored groups were also a risk for their organisation. 

The survey's findings were drawn from 1,755 global organisations while over 60 of these were based in Australia. Interestingly, it also found that Australian companies believed the risk associated with these categories was higher than their international counterparts.

EY Oceania Cyber Leader Richard Watson pointed out  that "nearly half of respondents said their budgets needed to nearly double to align their organisation's need for protection with its managements' tolerance for risk".

He further said that businesses in Australia needed to focus on cybersecurity more as they lacked confidence in their cyber-related capabilities. To better manage cybersecurity resources, an organisation's employees can participate in information security training, which will educate them on their role within the company's overall risk strategy. 

Poor cybersecurity hygiene and increased risk 

One of the report's other findings was that mobile devices such as smartphones were impacting an organisation's perception of security. Specifically, 81 per cent of respondents named employee habits on mobile devices as the biggest risk to their cybersecurity. 

How can an organisation better identify and manage risk associated with cyber security?How can an organisation better identify and manage risk associated with cyber security?

One such example is the Information Security Awareness Program run by ALC Training. Poor employee cybersecurity practices is a major problem for businesses, however, there are IT security training courses employees can attend to inculcate the required awareness and behaviours needed to keep an organisation's information secure. 

The course targets human actions and aims to teach participants to be aware of how their behaviours can impact their organisation's cybersecurity risk. 

It specifically emphasises that successful organisational information security is more than a company's policies and procedures but an overall mindset that workers have to embrace. 

Some of the outcomes participants will learn include:

Identifying and mitigating the human factor related to cyberattacks is an important first step for organisations aiming to better secure their information. The course will help your organisation's cybersecurity policies and strategies be more effective and easier to follow. 

If you believe your business or organisation could benefit from a cybersecurity course, talk to ALC Training today to find out more. 

Mobile technology and cybersecurity

There is no doubting that mobile technology has transformed our lives. It has facilitated new activities, new jobs and new types of relationships (Tinder anyone?).

Unfortunately, many businesses believe that IT security training does not apply to mobile devices. This has led many individuals and organisations to develop a culture of unfettered app downloading. 

Mobile technology transformation 

According to the Boston Consulting Group, mobile technology is being adopted by people around the world faster than any technology that has gone before.

The Mobile Revolution report found that there was a 99 per cent decrease in cost per megabyte between 2005 and 2017, while infrastructure costs have reduced by 95 per cent during the transition from 3G and 4G.

Mobile technology created close to $3.3 trillion in revenue globally  directly contributed to 11 billion jobs.

Further, mobile technology created close to $3.3 trillion in revenue globally and directly contributed to 11 billion jobs. 

Changes like these have transformed the use of mobile technology, opening access to a whole new consumer base and helping to drive the global economy out of the recession.

But what about the security issues that are so often neglected? How could these become the industry’s Achilles cap up heel?

Why is mobile cybersecurity important?

Due to the prevalence of mobile devices in our homes and workplaces, they have become a key access point for cybercriminals trying to attain personal and valuable information. 

Worst of all, unsafe apps are on the rise. According to McAfee’s Threat Report, malware samples found on mobile devices are up 14 per cent, with a total of 6 million. 

But it is not just cybercriminals – over-eager app developers can lead to security and privacy concerns.

According to the February McAfee Mobile Security Report, 82 per cent of apps track personal information if connected to Wi-Fi or the device is turned on. 

For many of these apps, users agree to share their information during the installation phase. 

How secure is your mobile phone device?How secure is your mobile phone device?

How can I protect my personal information? 

There is a series of actions mobile device users can do to protect themselves. 

One of the best approaches is identifying unsafe mobile apps and avoiding their download and use at all costs. Having a safe and secure mobile device begins at the choices users make.

Another approach is attending information security training courses, such as ALC Training’s Information Security Awareness Program. 

This course addresses the human components of IT security breaches, offering strategies to implement a security mindset.

Mobile security is an important aspect for both individuals and businesses. For advice on cybersecurity, talk to ALC Training, the information security training specialists. 

3 technology trends for small businesses

When people think of technological innovators, they do not usually think of small businesses. However, Australian companies have shown an aptitude for adapting technology to their business plan. Actions such as attaining an ITIL certification can give owners the knowledge they need to get ahead of their competitors. 

78 per cent of Australian small businesses are positive about growth opportunities on the horizon.

A recent survey by KPMG found that 78 per cent of Australian small businesses are positive about growth opportunities on the horizon. The bi-annual Family Business Survey 2015 was undertaken by KPMG Australia and Family Business Australia.

Respondents were also interested in the impact new technology will have on their business. Over 50 per cent of the respondents agreed that technological change was having a positive effect on their organisation's operations.

Head of KPMG Australia's Family Business Practice Bill Noye said that the survey indicated that Australian businesses were keeping a track of innovation and multiplicity in the tech industry, which is a good economic health indicator.

"Embracing disruptive technologies and keeping up with rapid change, together with entrepreneurship, the willingness to take risks, delegate authority and proactively seek new ideas and opportunities, are all important attributes for developing a sustainable competitive advantage which technology can help to harness," he said.

With technology being such an important driver of small business growth prospects, here are three technology trends that may impact small businesses in Australia.

1) Mobile technology

As mobile technology continues to develop at an exceptional rate, small businesses will need to adapt to stay ahead of the curve.

According to a 2015 study by The Boston Consulting Group, the 25 per cent of SMEs that utilise mobile technology extensively can expect to have their revenues grow approximately two times quicker and develop new job opportunities eight times faster than the other 75 per cent who do not.

If you want your business to grow, get on board the mobile technology train.

Is your small business safe? Is your small business safe?

2) Network security

As much a technology has made are lives and business dealings better, it has also exposed us to greater risk of crime, specifically cybercrime.

According to a 2011 study by Symantec, 40 per cent of all cyberattacks targeted SME that employ fewer than 500 people.

Small businesses need to be aware of cybercrime. One way to do this is by participating in information security training, which can help you understand some of the key concepts that may safeguard your business from threats.

3) Business intelligence

In the past, business intelligence software was the prerogative of large companies. However, in recent years, there has been an increase in affordable business intelligence tools.

These typically provide support for a quicker and more informative decision-making process, which translates into a critical advantage for small businesses.

To find discover how technology can better help your business, talk to ALC Training today.