Types of threats

Account compromise

Account compromise is when criminals get unauthorised access to your email, banking, or other accounts.

Business email compromise

Protect your business and employees from phishing attacks designed to steal your money, goods or information. 


Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions. The miners are then rewarded with a small amount of cybercurrency.

Data breaches

Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. These are known as data breaches or data spills. 


Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour. 

Identity theft

Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. 

Malicious insiders

Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems.


Malware is software that cybercriminals use to harm your computer system or network. Types of malware include Trojans, viruses and worms.


Emails containing malware pretending to be from trusted parties.


Quishing is a form of phishing attack that uses QR codes instead of text-based links in emails, digital platforms or on physical items.


Ransomware is a common and dangerous type of malware. It works by locking up or encrypting your files so you can no longer access them. 


Online scams cost Australians millions of dollars each year and anyone can be targeted. Scammers often use familiar brands and logos to make themselves seem reliable. 

Was this information helpful?

Thanks for your feedback!


Tell us why this information was helpful and we’ll work on making more pages like it