{"id":2663,"date":"2023-12-11T23:24:39","date_gmt":"2023-12-11T23:24:39","guid":{"rendered":"https:\/\/www.keynoteentertainment.com.au\/blog\/?p=2663"},"modified":"2023-12-11T23:24:40","modified_gmt":"2023-12-11T23:24:40","slug":"are-your-staff-exposing-you-to-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/","title":{"rendered":"Are your Staff Exposing you to Cyber Attacks?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png\" alt=\"cyber security\" class=\"wp-image-2664\" srcset=\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png 1024w, https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-300x169.png 300w, https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-768x432.png 768w, https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1536x864.png 1536w, https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter.png 1600w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong><em>&#8220;Dear Esteemed One, I am Prince Ahmed Zumar from the royal family of Nigeria. I have a proposition that may be of interest to you, greatly. My late father the King left behind a fortune&#8230;&#8221;<\/em><\/strong><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Ah, fond memories of the &#8220;Nigerian Prince&#8221; who generously promised unimaginable riches in exchange for just a small transaction fee. If only today\u2019s hacker attempts were so wonderfully transparent. But armed with a little help from generative AI, today\u2019s Nigerian Prince now speaks perfect English (and French\u2026 and Italian) and can craft highly targeted messages ingeniously tailored to specific profiles &#8211; with not a wayward apostrophe in sight.<\/p>\n\n\n\n<p>Unfortunately, our Prince also now comes cleverly disguised as a CEO, supplier and fellow employee, and is devastatingly effective at running scams that are costing Australian businesses millions of dollars every year. And it\u2019s no longer a straightforward plea for money either. Thanks to AI, we now have an abundance of deceptively authentic-looking content being used to \u2018legitimise\u2019 requests, like corporate websites, landing pages, social media accounts and LinkedIn profiles, complete with AI-simulated profile photo\u2019s.<\/p>\n\n\n\n<p>But technology alone isn\u2019t to blame. In fact, according to <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/brian-hay\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Brian Hay<\/mark><\/a><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">,<\/mark> renowned Cyber Security expert and winner of McAfee\u2019s international award for Cybercrime Fighter of the Year, up to 95% of all breaches are caused by people. He says that \u201c96% \u2013 99% of cyberattacks are directed at the person \u2013 not the network \u2013 why?&nbsp;Because we are the soft target \u2013 the vulnerability!\u201d<\/p>\n\n\n\n<p>Because scams essentially succeed when someone, somewhere, feels compelled to click on a link, unintentionally providing hackers with open access to data and setting in motion an unstoppable chain of events.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>How big is the problem really?<\/strong><\/p>\n\n\n\n<p>Optus, Medibank Private, Latitude Financial, Woolworths, Pizza Hut and Dymocks are just some of the big businesses that reported <a href=\"https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">significant cyber incidents<\/mark><\/a> between July 2022 to June 2023. In the first half of 2023 alone there were <a href=\"https:\/\/www.oaic.gov.au\/privacy\/notifiable-data-breaches\/notifiable-data-breaches-publications\/notifiable-data-breaches-report-january-to-june-2023#:~:text=Twenty%2Done%20of%20the%2023,and%20phishing%20(compromised%20credentials).\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">23 data breaches<\/mark><\/a>, affecting more than 11 million Australians.<\/p>\n\n\n\n<p>But despite the media storm, it was small businesses (0-19 employees) &#8211; which account for <a href=\"https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">97.3%<\/mark><\/a> of all Australian businesses &#8211; that bore the brunt of <a href=\"https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">92.6%<\/mark><\/a> of business cyberattacks.<\/p>\n\n\n\n<p>The Australian government\u2019s <a href=\"https:\/\/www.aic.gov.au\/sites\/default\/files\/2023-07\/sr43_cybercrime_in_australia_2023_v2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">2023 Cybercrime report<\/mark><\/a> found that 22% of small businesses were impacted by cybercrime in 2022 &#8211; which, according to the latest\u00a0<a href=\"https:\/\/www.accc.gov.au\/system\/files\/Targeting%20scams%202022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Targeting Scams report<\/mark><\/a>, equated to $13.7 million in losses &#8211; a 95% increase on the previous year. Across the total Australian business community, there was a 73% increase in losses, totalling $23.2 million.<\/p>\n\n\n\n<p>And with <a href=\"https:\/\/www.oaic.gov.au\/privacy\/notifiable-data-breaches\/notifiable-data-breaches-publications\/notifiable-data-breaches-report-january-to-june-2023#:~:text=Twenty%2Done%20of%20the%2023,and%20phishing%20(compromised%20credentials).\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">47% of Australians<\/mark><\/a> saying they would close their account or stop using a product or service provided by an organisation that experienced a breach, the impact could be catastrophic for the businesses involved.<\/p>\n\n\n\n<p>Worryingly, the <a href=\"https:\/\/www.aic.gov.au\/sites\/default\/files\/2023-07\/sr43_cybercrime_in_australia_2023_v2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">2023 Cybercrime report<\/mark><\/a> also stated that most cybercrime went unreported, meaning official statistics significantly underestimate the size of the issue.<\/p>\n\n\n\n<p>So how big is the problem? It\u2019s big\u2026 and it\u2019s getting bigger.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>What does business cybercrime look like?<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.aic.gov.au\/sites\/default\/files\/2023-07\/sr43_cybercrime_in_australia_2023_v2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">2023 Cybercrime report<\/mark><\/a> identified the biggest contributor as the payment redirection scam, also known as business email compromise (BEC) \u2013 basically phishing messages masquerading as legitimate communications, compelling its target to download a file, provide information or click a link.<\/p>\n\n\n\n<p>It\u2019s no coincidence that there\u2019s been a <a href=\"https:\/\/slashnext.com\/state-of-phishing-2023\/?utm_source=www.theneurondaily.com&amp;utm_medium=newsletter&amp;utm_campaign=ai-phishing-attacks\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">1,265% increase<\/mark><\/a> in those phishing emails since the launch of ChatGPT. And custom AI platforms like WormGPT and FraudGPT, which can create believable phishing scams and generate fake websites to support those campaigns, are also frighteningly adept at supporting criminal cyber activity.<\/p>\n\n\n\n<p>Just think\u2026 if you received an email from a colleague or associate &#8211; correct sender address, correct email signature, company links in place and usual tone of voice &#8211; instructing you to review a relevant document\u2026 would you think twice about clicking on it?<\/p>\n\n\n\n<p>In an even scarier turn of events, ex-hacker turned leading cyber security expert <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/innovation\/bastien-treptel\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Bastien Treptel<\/mark><\/a> revealed in a recent ABC interview that you don\u2019t even need to click on a malicious email or file now. He says, \u201cIf you use Outlook as a browser, or even Gmail, it\u2019s got the option to automatically download pictures, if you turn that on, you\u2019re at risk.\u201d Frightening.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>What can you do?<\/strong><\/p>\n\n\n\n<p>In response to growing concerns around cyber security, the Australian government has just announced an $18 million package as part of their new <a href=\"https:\/\/www.homeaffairs.gov.au\/cyber-security-subsite\/files\/2023-cyber-security-strategy-action-plan.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">2023\u20132030 Australian Cyber Security Strategy<\/mark><\/a> to help small and medium businesses prepare for and respond to cyber-attacks. The first phase of the rollout (between 2023 &#8211; 2025) will give businesses access to free cyber security \u2018health checks\u2019, supported by tailored guidance on improving their cyber security and dealing with cyber-attacks if they arise.<\/p>\n\n\n\n<p>In the meantime, here are <strong>three relatively simple actions<\/strong> you can take to secure your devices and IT infrastructure, and strengthen your \u2018human firewall\u2019 against attack.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>1. Employee training and culture<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Cyber Intelligence Strategic Advisor <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/katherine-mansted\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Katherine Mansted<\/mark><\/a><strong> <\/strong>believes that \u201cTraining and testing staff to ensure that cyber security remains an organisation-wide priority is critical to ensuring that gaps in your cyber defence are avoided, and to increase the likelihood that attacks are detected and disrupted.\u201d<\/p>\n\n\n\n<p>Conducting regular cyber security training sessions for all employees, and teaching them about the latest threats, phishing tactics and safe practices online, will help them understand their role in avoiding and reporting malicious activity. Try mixing it up with a combination of phishing simulations, online and face-to-face training, and consider bringing in a <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/tags\/cyber-security\/3\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">cyber security speaker<\/mark><\/a><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/mark>&#8211; with expert knowledge and experience, they can really help transform behaviours and inspire a more security-conscious culture.<\/p>\n\n\n\n<p>And that security-conscious culture, where everyone feels responsible for safeguarding sensitive data, is critical. As Cybersecurity expert and Shark Tank star <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/robert-herjavec\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Robert Herjavec<\/mark><\/a> says, \u201cTo establish a secure environment, it is crucial for employees to embrace a cyber security culture and prioritise security on a daily basis. This will help minimise the vulnerability caused by human error, which is often the weakest link in cyber security.\u201d<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>2. Beef up your security<\/strong><\/p>\n\n\n\n<p>With remote work now commonplace, it\u2019s more important than ever to add an extra layer of security to make it more difficult for hackers to gain access.<\/p>\n\n\n\n<p>Enforce the use of complex passwords and multi-factor authentication (MFA) where possible, and provide guidelines and tools for securing home networks. Encrypted Wi-Fi networks and Virtual Private Networks (VPN\u2019s) should be mandatory for accessing company resources remotely. Also, limit access to sensitive data and systems to only those employees who require them for their roles, and regularly review those user permissions to help prevent unauthorised access.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>3. Update and back-up<\/strong><\/p>\n\n\n\n<p>Cybercriminals often exploit vulnerabilities in outdated software. So when your computer tells you it\u2019s time to shut down so it can install updates, don\u2019t click \u2018ignore\u2019! By ensuring all software, including operating systems, applications, firewalls and antivirus programs are regularly updated with the latest security patches, you\u2019ll have the best chance of holding hackers at bay.<\/p>\n\n\n\n<p>But if those hackers do get through? You\u2019ll want to be able to recover your data without significant losses. So make sure you establish regular data backups and have a recovery plan in place. You\u2019ll also want an <a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/publications\/cyber-incident-response-plan\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">incident response plan<\/mark><\/a>, outlining steps to take in the event of a cyber-attack, including who to contact, how to contain the breach and the steps for recovery.<\/p>\n\n\n\n<p>And if your business has been targeted, don\u2019t forget to report it to\u00a0<a href=\"https:\/\/www.scamwatch.gov.au\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">SCAMwatch<\/mark><\/a>\u00a0or the <a href=\"https:\/\/www.cyber.gov.au\/report-and-recover\/report\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Australian Cyber Security Centre<\/mark><\/a>. You can also contact the Australian Cyber Security Commission via <a href=\"mailto:asd.assist@defence.gov.au\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">email<\/mark><\/a> or through their Hotline on\u00a01300\u00a0cyber1 (1300\u00a0292\u00a0371) for advice and assistance.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Former FBI Director Robert Mueller once famously said, \u201cThere are only two types of companies: those that have been hacked, and those that will be.\u201d Whether your business is big or small, the evolution of the \u2018Nigerian Prince\u2019 has upped the ante when it comes to cybercrime &#8211; it\u2019s no longer a question of if, but when. And while securing your IT infrastructure is critical to keeping those cyber crooks out of your systems, it\u2019s even more important to strengthen the weakest link in your security chain \u2013 and that\u2019s your staff. If you can train those who connect it to protect it, that Nigerian Prince may just have to find a new kingdom to conquer!<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>We have the most knowledgeable and captivating <\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/tags\/cyber-security\/3\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">cyber security speakers<\/mark><\/strong><\/a><strong> in the business, including <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/jess-modini\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Jess Modi<\/mark><\/a><\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/jess-modini\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">ni<\/mark><\/strong><\/a><strong>, <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/robert-herjavec\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">B<\/mark><\/a><\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/brian-hay\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">rian Hay<\/mark><\/strong><\/a><strong>, <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/robert-herjavec\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Robert Herjavec<\/mark><\/a><\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/business-speakers\/robert-herjavec\"><strong>, <\/strong><\/a><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/katherine-mansted\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Katherine Mansted<\/mark><\/strong><\/a><strong>, <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/matthew-miller\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Matthew Miller<\/mark><\/a>, <a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/social-media\/susan-mclean\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Susan McLean<\/mark><\/a>, <\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/futurists-future-trends\/robert-potter\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Robert Potter<\/mark><\/strong><\/a><strong>, <\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/innovation\/bastien-treptel\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Bastien Treptel<\/mark><\/strong><\/a><strong> and <\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/speakers\/customer-service\/david-leaney\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">David Leaney<\/mark><\/strong><\/a><strong>, ready to share their wisdom with your team and help your business stay cyber secure. If you\u2019d like us to connect you, simply <\/strong><a href=\"https:\/\/www.keynoteentertainment.com.au\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"><strong>get in touch with us<\/strong><\/mark><\/a><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/mark>for a chat!<\/strong><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164],"tags":[163,162,35,30,31,44],"class_list":["post-2663","post","type-post","status-publish","format-standard","hentry","category-cyber-security","tag-cyberattack","tag-cyberintelligence","tag-cybersecurity","tag-keynoteentertainment","tag-keynotespeakers","tag-motivationalspeakers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are your Staff Exposing you to Cyber Attacks?<\/title>\n<meta name=\"description\" content=\"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are your Staff Exposing you to Cyber Attacks?\" \/>\n<meta property=\"og:description\" content=\"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Keynote Entertainment Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keynoteentertainment\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-11T23:24:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T23:24:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png\" \/>\n<meta name=\"author\" content=\"justin@keynote.net.au\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KeynoteEntmnt\" \/>\n<meta name=\"twitter:site\" content=\"@KeynoteEntmnt\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"justin@keynote.net.au\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\"},\"author\":{\"name\":\"justin@keynote.net.au\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034\"},\"headline\":\"Are your Staff Exposing you to Cyber Attacks?\",\"datePublished\":\"2023-12-11T23:24:39+00:00\",\"dateModified\":\"2023-12-11T23:24:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\"},\"wordCount\":1429,\"image\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png\",\"keywords\":[\"cyberattack\",\"cyberintelligence\",\"cybersecurity\",\"KeynoteEntertainment\",\"keynotespeakers\",\"motivationalspeakers\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\",\"url\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\",\"name\":\"Are your Staff Exposing you to Cyber Attacks?\",\"isPartOf\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png\",\"datePublished\":\"2023-12-11T23:24:39+00:00\",\"dateModified\":\"2023-12-11T23:24:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034\"},\"description\":\"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter.png\",\"contentUrl\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are your Staff Exposing you to Cyber Attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#website\",\"url\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/\",\"name\":\"Keynote Entertainment Blog\",\"description\":\"Keynote Entertainment Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034\",\"name\":\"justin@keynote.net.au\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/litespeed\/avatar\/e4f427e4907d8e329ae59f44550a4ab3.jpg?ver=1776236993\",\"contentUrl\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/litespeed\/avatar\/e4f427e4907d8e329ae59f44550a4ab3.jpg?ver=1776236993\",\"caption\":\"justin@keynote.net.au\"},\"url\":\"https:\/\/www.keynoteentertainment.com.au\/blog\/author\/justin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are your Staff Exposing you to Cyber Attacks?","description":"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Are your Staff Exposing you to Cyber Attacks?","og_description":"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.","og_url":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/","og_site_name":"Keynote Entertainment Blog","article_publisher":"https:\/\/www.facebook.com\/keynoteentertainment\/","article_published_time":"2023-12-11T23:24:39+00:00","article_modified_time":"2023-12-11T23:24:40+00:00","og_image":[{"url":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png","type":"","width":"","height":""}],"author":"justin@keynote.net.au","twitter_card":"summary_large_image","twitter_creator":"@KeynoteEntmnt","twitter_site":"@KeynoteEntmnt","twitter_misc":{"Written by":"justin@keynote.net.au","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/"},"author":{"name":"justin@keynote.net.au","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034"},"headline":"Are your Staff Exposing you to Cyber Attacks?","datePublished":"2023-12-11T23:24:39+00:00","dateModified":"2023-12-11T23:24:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/"},"wordCount":1429,"image":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png","keywords":["cyberattack","cyberintelligence","cybersecurity","KeynoteEntertainment","keynotespeakers","motivationalspeakers"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/","url":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/","name":"Are your Staff Exposing you to Cyber Attacks?","isPartOf":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter-1024x576.png","datePublished":"2023-12-11T23:24:39+00:00","dateModified":"2023-12-11T23:24:40+00:00","author":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034"},"description":"If you want to hack-proof your business, you need to start with the weakest link in your cyber security chain\u2026 and that\u2019s your staff.","breadcrumb":{"@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#primaryimage","url":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter.png","contentUrl":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/uploads\/2023\/12\/Cyber-security-blog-post-cover-twitter.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/are-your-staff-exposing-you-to-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keynoteentertainment.com.au\/blog\/"},{"@type":"ListItem","position":2,"name":"Are your Staff Exposing you to Cyber Attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#website","url":"https:\/\/www.keynoteentertainment.com.au\/blog\/","name":"Keynote Entertainment Blog","description":"Keynote Entertainment Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keynoteentertainment.com.au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/77ee8c548c3eb1b261edf1c9f8076034","name":"justin@keynote.net.au","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keynoteentertainment.com.au\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/litespeed\/avatar\/e4f427e4907d8e329ae59f44550a4ab3.jpg?ver=1776236993","contentUrl":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-content\/litespeed\/avatar\/e4f427e4907d8e329ae59f44550a4ab3.jpg?ver=1776236993","caption":"justin@keynote.net.au"},"url":"https:\/\/www.keynoteentertainment.com.au\/blog\/author\/justin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/posts\/2663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2663"}],"version-history":[{"count":3,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/posts\/2663\/revisions"}],"predecessor-version":[{"id":2678,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/posts\/2663\/revisions\/2678"}],"wp:attachment":[{"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keynoteentertainment.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}