Types of threats
Account compromise
Account compromise is when criminals get unauthorised access to your email, banking, or other accounts.
Business email compromise
Protect your business and employees from phishing attacks designed to steal your money, goods or information.
Cryptomining
Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions. The miners are then rewarded with a small amount of cybercurrency.
Data breaches
Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. These are known as data breaches or data spills.
Hacking
Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.
Identity theft
Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits.
Malicious insiders
Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems.
Malware
Malware is software that cybercriminals use to harm your computer system or network. Types of malware include Trojans, viruses and worms.
Phishing
Emails containing malware pretending to be from trusted parties.
Quishing
Quishing is a form of phishing attack that uses QR codes instead of text-based links in emails, digital platforms or on physical items.
Ransomware
Ransomware is a common and dangerous type of malware. It works by locking up or encrypting your files so you can no longer access them.
Scams
Online scams cost Australians millions of dollars each year and anyone can be targeted. Scammers often use familiar brands and logos to make themselves seem reliable.