Cloud. It’s not automatically secure.

March 14, 2025
Kane Nawrocki
CEO
Development

In a recent survey by Sophos, it was revealed that 74% of Australian businesses have suffered a public cloud security breach.    

   

Just because your data is in the cloud doesn’t mean it’s secure. In fact, 66% of those breaches suffered were due to a security misconfiguration. Basically, somebody left the back door open.

   

With the huge swing to working from home in 2020, we’re seeing even more vulnerabilities being exploited. Toll Group has experienced two ransomware attacks in the last 6 months, leaving them unable to access the majority of their systems, and relying on paper clipboards for delivery drivers to collect signatures in the heart of COVID.

   

Hackers run their schemes like a business. They use topical subjects and trends to customise their messages, and just looking for a tell-tale spelling error is no longer the giveaway it used to be. Recently there have been numerous warnings about COVID scams from Australia ScamWatch.

   

https://www.scamwatch.gov.au/types-of-scams/current-covid-19-coronavirus-scams

   

Why is this important?

   

Because despite what we tell people to do, people are lazy. People have the same passwords across numerous sites, including employment related logins. According to a Google study 51% of users admitted they used one ‘favourite’ password for multiple sites. This decision puts your business and network data at risk!

   

With users having the same password for multiple sites, when they follow a link to a scam or from a phishing email, there is a high likelihood that they’re giving up access to your company data inadvertently.

   

With your employees working from home, how many will have changed their default router or wi-fi password? A quick google search of ‘default router password’ popped up the defaults for Linksys, D-Link, plus instructions on how to simply find a default password.

   

We understand that the shift to working from home wasn’t really your choice in some cases, but now that it looks like it’ll be here for the foreseeable future, it’s time we talked about how we make sure your company data perimeter is secure.

   

Do you know where the security weaknesses are within your new extended network? We’ve created a quick 3min work from home security audit quiz. Click here to see how you score!  

Frequently Asked
Questions

Do you complete Security Audits?

YES - we can complete one-off audits to give you a second opinion on your environment. However, this is what we refer to as IT Cowboys, and we would prefer to build an ongoing relationship with you. That’s why, when you commit to one of our packages, we complete an onboarding audit, which includes a security audit, a gap analysis against our Tactical 12 fortress, along with internal and external penetration tests. We then put together a plan for remediation as quickly as possible to ensure your compliance and get your insurance sorted ASAP so you’re covered.

Do you come to site?

In the initial onboarding process, we attend your site to document and understand how you operate, completing a checklist, inspecting infrastructure suitability, meeting key stakeholders, and performing general IT housekeeping. Once the onboarding process is complete, your environment should be rock solid, and the need to attend the site moving forward should be very minimal, if at all.

Will my existing computers be supported?

YES - Providing they are a currently supported operating system by the vendor and under warranty by the manufacturer.

Do you support Apple Mac and can they be compliant?

YES - we worked hard to ensure that Apple products can be supported and secured under all our product offerings.

What happens if an issue arises outside my support contract?

inSUPPORT Helpdesk operates a 24/7 'follow-the-sun' support desk, serviced by a team of global geeks. You might get a Kiwi from New Zealand on one call, and a Pinoy/Pinay from the Philippines on the next.