{"id":2295,"date":"2023-11-13T02:20:54","date_gmt":"2023-11-12T18:20:54","guid":{"rendered":"https:\/\/b6pub.azurewebsites.net\/?page_id=2295"},"modified":"2023-11-13T03:07:04","modified_gmt":"2023-11-12T19:07:04","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/b6technology.com.au\/?page_id=2295","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2295\" class=\"elementor elementor-2295\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8cd5e3 ct-section-stretched elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"d8cd5e3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1edf758\" data-id=\"1edf758\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e1d1bd elementor-widget elementor-widget-heading\" data-id=\"2e1d1bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d59cb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d59cb8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c03c535\" data-id=\"c03c535\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44e68a1 elementor-widget elementor-widget-heading\" data-id=\"44e68a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecting your information<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71ac3be elementor-widget elementor-widget-text-editor\" data-id=\"71ac3be\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-size: inherit; text-align: inherit; color: var( --e-global-color-text ); background-color: var( --e-global-color-blocksy_palette_7 ); font-family: var(--fontFamily); font-style: var(--fontStyle, inherit); font-weight: var(--fontWeight); letter-spacing: var(--letterSpacing); text-transform: var(--textTransform);\">Cyber incidents are not a rarity, they are a rule. According to the ACSC&#8217;s Annual Cyber Threat Report (2021-2022), 76,000 cybercrime reports were made in Australia alone for that period.\u00a0<\/span><\/p><p>The enemy is no longer a curious teenager on his parents&#8217; computer. Professional businesses are established for the sole purpose of eliciting funds and information from Western organizations and individuals, contributing funds to organised crime and international drug syndicates. In the case of nation-state actors, the target is often just as valuable &#8211; intellectual property that they might not otherwise have access to.\u00a0<\/p><p><span style=\"background-color: var( --e-global-color-blocksy_palette_7 ); color: var( --e-global-color-text ); font-family: var(--fontFamily); font-size: inherit; font-style: var(--fontStyle, inherit); font-weight: var(--fontWeight); letter-spacing: var(--letterSpacing); text-align: inherit; text-transform: var(--textTransform);\">Cybersecurity is the practice of hardening your policies, procedures, and technology to improve your security posture to a point where your business does not become the &#8216;easy target&#8217;.\u00a0\u00a0<\/span><\/p><p>They say that prevention is better than cure. When it comes to a cyber breach there is no cure. Once the breach has occurred, the damage has been done.\u00a0<\/p><p>Fallout from a cybersecurity incident can include:<\/p><ul><li>Loss of sales revenue resulting from system outages; and\u00a0<\/li><li>Loss of client trust in your brand.<\/li><\/ul><div>Cybersecurity is an ongoing process requiring ongoing attention from your Board and Management. It is not a project that can be placed on the shelf, on completion.\u00a0<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ce396b7\" data-id=\"ce396b7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2eb4af9 elementor-widget elementor-widget-heading\" data-id=\"2eb4af9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Speak to us<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7fad96 elementor-widget elementor-widget-text-editor\" data-id=\"c7fad96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Contact us today for a private discussion on your cybersecurity concerns.\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e621b0b elementor-widget elementor-widget-shortcode\" data-id=\"e621b0b\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"44318633\",\n    formId: \"3d0e14e2-4a1a-4a69-bf66-990d6b85d3fd\"\n  });\n<\/script><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Protecting your information Cyber incidents are not a rarity, they are a rule. According to the ACSC&#8217;s Annual Cyber Threat Report (2021-2022), 76,000 cybercrime reports were made in Australia alone for that period.\u00a0 The enemy is no longer a curious teenager on his parents&#8217; computer. Professional businesses are established for the sole purpose of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"blocksy_meta":[],"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"b6user","author_link":"https:\/\/b6technology.com.au\/?author=1"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Cybersecurity Protecting your information Cyber incidents are not a rarity, they are a rule. According to the ACSC&#8217;s Annual Cyber Threat Report (2021-2022), 76,000 cybercrime reports were made in Australia alone for that period.\u00a0 The enemy is no longer a curious teenager on his parents&#8217; computer. Professional businesses are established for the sole purpose of&hellip;","_links":{"self":[{"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/pages\/2295"}],"collection":[{"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/b6technology.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2295"}],"version-history":[{"count":16,"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/pages\/2295\/revisions"}],"predecessor-version":[{"id":2340,"href":"https:\/\/b6technology.com.au\/index.php?rest_route=\/wp\/v2\/pages\/2295\/revisions\/2340"}],"wp:attachment":[{"href":"https:\/\/b6technology.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}