{"id":10419,"date":"2017-10-07T13:16:14","date_gmt":"2017-10-07T02:16:14","guid":{"rendered":"https:\/\/smithink.stackedsite.com\/?p=10419"},"modified":"2019-05-31T13:55:43","modified_gmt":"2019-05-31T03:55:43","slug":"the-crooks-are-getting-smarter","status":"publish","type":"post","link":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/","title":{"rendered":"The crooks are getting smarter"},"content":{"rendered":"

With every technology change, the criminal element comes running in working out ways to exploit it. The cloud then is such a wonderful opportunity for the crooks. Without leaving their lair they are presented to the door of almost every piece of data on the planet. All they need are the keys to open the door.<\/p>\n

Poor usernames and passwords are the first line of attack. If one of your service providers have been subject to a widespread attack such as companies like LinkedIn, Adobe and others have experienced it is likely that your username and password combinations that you had for those services can be obtained by the crooks and used to break into your accounts on other services. If you\u2019re not sure go to\u00a0https:\/\/haveibeenpwned.com\/<\/a>\u00a0to check whether your username or email address has possibly been compromised.<\/p>\n

Of course the obvious also applies. Use different passwords for different services. Use passwords that are difficult to break. It\u2019s all a hassle but in this day and age, one has little alternative.<\/p>\n

Using two-factor authentication is also important. It should be turned on where available for every service that you use. Two-factor authentication involves sending a code to your mobile device which means you need to have the device as well as a password to gain access. However, it\u2019s not infallible. The crooks are managing to find ways of redirecting SMS messages by hacking telcos and other means. For this reason, many companies are now using their own mobile apps to manage two-factor authentication rather than relying on SMS.<\/p>\n

Accounting firms are a very attractive target for the crooks due to the sensitive financial and private client data that are held on firms\u2019 systems. Much, if not all, the information needed to successfully steal an identity can be found in client data.<\/p>\n

Cloud accounting systems are another point of vulnerability. Access to an accountant\u2019s cloud accounting dashboard might deliver access to many clients\u2019 accounting ledgers with the treasure trove of employee records held in the payroll systems. Firms need to be extra vigilant in ensuring access is secure as possible.<\/p>\n

These are just some of the things to consider. Come to ATSA on October 16-17 to hear a number of speakers discuss this increasingly important topic.\u00a0Click here to find out more.\u00a0<\/a><\/p>\n

Nothing is 100% secure. So the next thing you need is a plan. You need to have your client communications ready. How would you communicate with your clients if a breach occurred? What would you tell them to do? What in turn should they be saying to their employees? You need to have templates ready to go at a moment\u2019s notice.<\/p>\n

There are a number of guides and services to assist you should a breach occur. The Australian Government\u2019s Office of the Information Commissioner has a guide \u201cData breach notification \u2014 A guide to handling personal information security breaches\u201d which can be found here\u00a0https:\/\/www.oaic.gov.au\/agencies-and-organisations\/guides\/data-breach-notification-a-guide-to-handling-personal-information-security-breaches<\/a>.<\/p>\n

There is also this guide on notifiable data breaches\u00a0https:\/\/www.oaic.gov.au\/engage-with-us\/consultations\/notifiable-data-breaches\/<\/a>\u00a0as well as this support service for people concerned about identity theft and cybersecurity generally\u00a0http:\/\/www.idcare.org\/<\/a>.<\/p>\n

Training of your team is also critical to ensure that they know what to look for and what they should do if they suspect a problem has occurred.<\/p>\n

There are many other things you need to consider including keeping software up to date, securing mobile devices, strong backups of data, malicious software scanning and more. It is critical you are across all of these issues.<\/p>\n

Cyber Insurance is another key component of your risk management plan.<\/p>\n

Come to\u00a0ATSA in Sydney on October 16-17<\/a>\u00a0to hear from the experts and ensure you\u2019re on top of it all. ATSA, of course, delivers much more with over 70 sessions and over 65 exhibitors providing you with the opportunity to ensure that you\u2019re keeping your practice at the forefront of leveraging technology.<\/p>\n","protected":false},"excerpt":{"rendered":"

With every technology change, the criminal element comes running in working out ways to exploit it. The cloud then is such a wonderful opportunity for the crooks. Without leaving their lair they are presented to the door of almost every piece of data on the planet. All they need are the keys to open the…<\/p>\n","protected":false},"author":854,"featured_media":10420,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\nThe crooks are getting smarter - Smithink<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The crooks are getting smarter - Smithink\" \/>\n<meta property=\"og:description\" content=\"With every technology change, the criminal element comes running in working out ways to exploit it. The cloud then is such a wonderful opportunity for the crooks. Without leaving their lair they are presented to the door of almost every piece of data on the planet. All they need are the keys to open the…\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/\" \/>\n<meta property=\"og:site_name\" content=\"Smithink\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-07T02:16:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-31T03:55:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smithink.com\/wp-content\/uploads\/sites\/478\/2019\/05\/The-crooks-are-getting-smarter.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marvin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marvin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/\",\"url\":\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/\",\"name\":\"The crooks are getting smarter - Smithink\",\"isPartOf\":{\"@id\":\"https:\/\/smithink.com\/#website\"},\"datePublished\":\"2017-10-07T02:16:14+00:00\",\"dateModified\":\"2019-05-31T03:55:43+00:00\",\"author\":{\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3\"},\"breadcrumb\":{\"@id\":\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/smithink.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The crooks are getting smarter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/smithink.com\/#website\",\"url\":\"https:\/\/smithink.com\/\",\"name\":\"Smithink\",\"description\":\"Experience delivers the how\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/smithink.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3\",\"name\":\"marvin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/smithink.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g\",\"caption\":\"marvin\"},\"url\":\"https:\/\/smithink.com\/author\/marvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The crooks are getting smarter - Smithink","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/","og_locale":"en_US","og_type":"article","og_title":"The crooks are getting smarter - Smithink","og_description":"With every technology change, the criminal element comes running in working out ways to exploit it. The cloud then is such a wonderful opportunity for the crooks. Without leaving their lair they are presented to the door of almost every piece of data on the planet. All they need are the keys to open the…","og_url":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/","og_site_name":"Smithink","article_published_time":"2017-10-07T02:16:14+00:00","article_modified_time":"2019-05-31T03:55:43+00:00","og_image":[{"width":480,"height":320,"url":"https:\/\/smithink.com\/wp-content\/uploads\/sites\/478\/2019\/05\/The-crooks-are-getting-smarter.jpg","type":"image\/jpeg"}],"author":"marvin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marvin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/","url":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/","name":"The crooks are getting smarter - Smithink","isPartOf":{"@id":"https:\/\/smithink.com\/#website"},"datePublished":"2017-10-07T02:16:14+00:00","dateModified":"2019-05-31T03:55:43+00:00","author":{"@id":"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3"},"breadcrumb":{"@id":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/smithink.com\/2017\/10\/07\/the-crooks-are-getting-smarter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smithink.com\/"},{"@type":"ListItem","position":2,"name":"The crooks are getting smarter"}]},{"@type":"WebSite","@id":"https:\/\/smithink.com\/#website","url":"https:\/\/smithink.com\/","name":"Smithink","description":"Experience delivers the how","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smithink.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/smithink.com\/#\/schema\/person\/03caa179bd15e4165688fcb8757cd9f3","name":"marvin","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/smithink.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dea7335c8ba69364fc85b1b30c77022b?s=96&d=mm&r=g","caption":"marvin"},"url":"https:\/\/smithink.com\/author\/marvin\/"}]}},"_links":{"self":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10419"}],"collection":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/users\/854"}],"replies":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/comments?post=10419"}],"version-history":[{"count":1,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10419\/revisions"}],"predecessor-version":[{"id":10421,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/posts\/10419\/revisions\/10421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/media\/10420"}],"wp:attachment":[{"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/media?parent=10419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/categories?post=10419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smithink.com\/wp-json\/wp\/v2\/tags?post=10419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}