Main Menu

  • Real Digital Transformation - 3T Solutions

    REAL Digital Transformation

    Recent research has found that overall costs of having HCI solution has gone down by over 30 percent and 3T can help you to get REAL digital transformation experience.

    Learn More
  • 3T Solutions Modern Workplaces Unified Endoint Management

    Transforming IT Service Delivery

    The anywhere workplace is a game changer!

    3T enables true potentials of your employees to work more effectively, productively and collaboratively,

    Learn More
  • Enable the Potential

    Ready to Take Full Advantages of Office 365?

    With Office 365, modernise your infrastructure,increase productivity and collaboration, whilst keeping your business secure. Wherever you are in cloud journey, realise your potential with 3T Solutions

    Learn More
Security Attacks 

The swift, public, and pervasive cyber attacks in 2017 demonstrated how cyber risk cannot be effectively managed solely as an information technology (IT) issue. The WannaCry ransomware attack hit over 200,000 computers in 150 countries, taking businesses offline, disrupting sales and operations. Arguably the most significant data breach in U.S. history hit Equifax, exposing the sensitive data of 143 million people, while subjecting the company to legal claims resulting in a dramatic loss of shareholder value and executive resignations.

Cyber security by the numbers:

  • 516,380 — the number of Australian small businesses that fell victim to cyber crime in 2017, according to Norton.
  • $4677 — the average amount the majority of SMEs would have to pay to free their data from ransomware.
  • 25 hours or more — the amount of downtime one in four businesses hit by cyber attacks suffer.
  • $1.9 million — the average cost to a medium sized business if hit by a cyber attack.
  • One third — the number of SMEs who say they continuously back up their systems’ data.
  • One — the number of staff members that hackers need to dupe in order to gain access to your business’ data
  • 63 — the number of data breaches the Office of the Information Commissioner was notified about in the first six weeks of mandatory data breach reporting.
  • 1,800,000 — the number of dollars you might have to cough up if you don’t comply with the mandatory data breach laws
  • $8,429 — the price of one Bitcoin (at the moment). Businesses often require the digital currency to send to hackers as a ransom payment.
  • 30 — the number of gigabytes of sensitive Department of Defence data lost by a small “mum and dad” business in a 2016 data breach
  • $14 million — the amount in compensation offered to users of Ashley Madison after the adultery site’s famous 2015 data breach.
  • Three — the number of really weirdly named ransomware attacks that devastated global businesses in 2017.
  • Five — the number of minutes you need to read through the Australian Small Business Ombudsman’s cyber security guide for small businesses.
Worried About Security?
If you want to protect your company, you need to understand the most common cyber security vulnerabilities
  • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
  • Man-in-the-middle (MitM) attack
  • Phishing and spear phishing attacks
  • Drive-by attack
  • Password attack
  • SQL injection attack
  • Cross-site scripting (XSS) attack
  • Eavesdropping attack
  • Birthday attack
  • Malware attack
Proactive Action
Know how to protect your data
Tomorrow may be too late to implement essential rules that make you safe
  • Train your management and employees
  • Back-up Regularly to prevent against loss
  • Patch management
  • Use complex password
  • Limit access to administrator account and sensitive data
  • Create segments in your network
  • Full device management and security
  • Email Protection
  • Web Protection
  • Multi-function Authentication
  • Implement SIEM solution
Keep doing what you do
Security is not a one-time solution. You need to maintain regularly and improve it consistently.
  • Check SIEM reports and fix the issues
  • Before implementing a new solution, consider its security requirements
  • Make sure that everything is up to date
  • Never create a back door
  • Learn new Security attacks, problems and protection products
  • At least once in a year, organize a penetration test
  • Don't let anyone attaches unmanaged device