
[
	{
		"post_id": "248", 
		"post_category_id": "1", 
		"post_title": "Cyber Security incident hits Brisbane Law Firm", 
		"post_content_short": "This weeks blog is a report written in response to a cyber incident involving a Brisbane Law firm who found themselves caught up in a scam centered around unauthorised access to the Microsoft 365 account of the firms Office Manager, Susie and the subsequent activity undertaken\nunder the account by the unauthorised party.<br \/>\n<br \/>\nOur blog&nbsp;provides a summary of the incident, remediation steps undertaken, an outline of the firms&nbsp;existing technology landscape\nand post-incident recommendations. It also highlights the importance of <a href=\"\/services\/staff-security-awareness-training\/\" target=\"_blank\"><strong><span style=\"color: #1c79c0;\">Security\nAwareness Training<\/span><\/strong><\/a>\nand strong cyber security practices are&nbsp;for your business.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/248\/law-(1).png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/cyber-security-incident-hits-brisbane-law-firm\/", 
		"post_date": "2024-12-04 03:06:00"
	}, 
	{
		"post_id": "225", 
		"post_category_id": "1", 
		"post_title": "Strengthen Your Business Defenses with Managed Detection and Response (MDR)", 
		"post_content_short": "With cybercriminals constantly evolving their tactics, traditional antivirus solutions might not be enough to keep your valuable data safe. This is where Managed&nbsp;Detection and Response (MDR) comes into play, offering a proactive approach to cybersecurity that every business\nshould consider.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/225\/tdlogo.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/strengthen-your-business-defenses-with-endpoint-detection-and-response-edr\/", 
		"post_date": "2024-03-06 11:37:00"
	}, 
	{
		"post_id": "207", 
		"post_category_id": "1", 
		"post_title": "What is Email Antispam and how can it help your business?", 
		"post_content_short": "Are you a small business owner, constantly wrestling with a tidal wave of junk emails clogging up your inbox? You're not alone. Email spam\n\thas evolved into a major headache for businesses across Australia. But there's a solution: email antispam, find out what it is and how\n\tit can help your business in our latest blog.\n", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/207\/antispam-5.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/what-is-email-antispam-and-how-can-it-help-your-business\/", 
		"post_date": "2023-07-19 01:54:00"
	}, 
	{
		"post_id": "175", 
		"post_category_id": "1", 
		"post_title": "What is Advanced Endpoint Detection & Response and how can it help your business?", 
		"post_content_short": "Malware is now the overarching term used to describe software engineered to do something nasty to a computer, but how can your protect yourself? Find out in our first blog of 2023.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/175\/photo-1635338349068-e1b91866217e.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/what-is-advanced-endpoint-detection-and-response-and-why-do-you-need-it\/", 
		"post_date": "2023-01-04 03:22:00"
	}, 
	{
		"post_id": "171", 
		"post_category_id": "1", 
		"post_title": "How to create and maintain strong password management", 
		"post_content_short": "We are all familiar with passwords. A typically annoying to type in combination of letters, numbers, and symbols that when entered in the\n\tcorrect sequence, grant access to your account. It’s a simple premise, but compromised passwords happen all the time. Without the right\n\tstrategy for creating, storing, and updating passwords it’s only a matter of when, not if, a password belonging to a service important to\n\tyou or your business is compromised too. Find out how to maintain secure password practices in this weeks blog.\n", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/171\/PWM.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-to-create-and-maintain-strong-password-management\/", 
		"post_date": "2022-11-28 10:57:00"
	}, 
	{
		"post_id": "169", 
		"post_category_id": "1", 
		"post_title": "Tips for Identifying Phishing & Business Email Compromise Attempts", 
		"post_content_short": "Often referred to as the internet's cockroach, email has outlived all other forms of internet communications and has infested every corner\n\tof the globe. Operating your business without email is unimaginable. Hackers, fraudsters, and con artists know this, making your inbox their\n\tattack vector of choice. Email based attacks are easy to automate, cost nothing to send and they work because people keep opening their\n\tmessages. Find out how you can combat it in our latest blog.\n", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/169\/agence-olloweb-d9ILr-dbEdg-unsplash.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/tips-for-identifying-phishing-and-business-email-compromise-attempts\/", 
		"post_date": "2022-08-16 04:37:00"
	}, 
	{
		"post_id": "168", 
		"post_category_id": "1", 
		"post_title": "Setting up Cybersecurity Policies and Processes for Business", 
		"post_content_short": "A cybersecurity assessment helps your business fully realise your legal and professional cybersecurity obligations. But where do you start?\nFind out more by reading our blog.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/168\/jeshoots-com-fzOITuS1DIQ-unsplash.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/setting-up-cybersecurity-policies-and-processes-for-business\/", 
		"post_date": "2022-08-03 05:54:00"
	}, 
	{
		"post_id": "162", 
		"post_category_id": "1", 
		"post_title": "The benefits of using a VPN", 
		"post_content_short": "When you&nbsp;hear the term “virtual private network” &nbsp;or VPN you might think it’s something too high-tech for the average user and\n\tthere’s no reason why they should use a VPN. But there are many business benefits to using a VPN, find out more in our blog.\n\n<br \/>", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/162\/pexels-stefan-coders-2064586.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/reasons-why-everyone-should-use-a-vpn\/", 
		"post_date": "2022-07-27 02:22:00"
	}, 
	{
		"post_id": "155", 
		"post_category_id": "1", 
		"post_title": "How to Protect your Business on Microsoft and Apple", 
		"post_content_short": "Whether your business relies on Microsoft Windows OS or Apple Mac OS, the risk of cyber-attack is high without superior security measures.\nFind out about the threats and how we can help you stay ahead of them in our latest blog.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/155\/security-g821675289_640.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-to-protect-your-business-on-microsoft-and-apple\/", 
		"post_date": "2022-06-29 04:52:00"
	}, 
	{
		"post_id": "129", 
		"post_category_id": "1", 
		"post_title": "Top 5 things must haves in a personal Password Manager", 
		"post_content_short": "Using one of the best password managers is the single best way to boost your online security. There will be no more need to remember\n\tdozens of long, complicated passwords. Instead, you'll have just one long, complicated password or even your fingerprint that can unlock\n\tall the rest. Find out about the top 5 must haves for personal password manager tools in our blog.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/129\/Consumer-IOT.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/personal-password-management-tools\/", 
		"post_date": "2022-01-11 22:31:00"
	}, 
	{
		"post_id": "133", 
		"post_category_id": "1", 
		"post_title": "Australian IT User and Cyber Security Policy template", 
		"post_content_short": "Looking for a great template to get your business thinking about its technology infrastructure, where it is and how it is protected and\n\tprompt you to regularly review these processes? Then look no further, explore our blog and grab yourself a copy of our free&nbsp;IT User and\n\tCyber Security Policy template.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/133\/IT-Policy.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/it-user-and-cyber-security-policy-template\/", 
		"post_date": "2021-09-15 05:23:00"
	}, 
	{
		"post_id": "124", 
		"post_category_id": "1", 
		"post_title": "How often should a business replace their computers?", 
		"post_content_short": "This week we helped a legal&nbsp;client evaluate their current hardware assets to determine which were candidates for replacement and which\n\tmight be able to to have a hardware upgrade to extend their usable life. &nbsp;Find out the results in our latest blog.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/124\/Computer-upgrades.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-often-should-a-business-replace-their-computers\/", 
		"post_date": "2021-07-21 04:29:00"
	}, 
	{
		"post_id": "109", 
		"post_category_id": "1", 
		"post_title": "How Safe Is Your Technology? Security Vulnerabilities In 2021", 
		"post_content_short": "Security vulnerabilities aren’t a problem… until they are. Here’s how they work, and how to protect yourself from them.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/109\/fingerprint-2904774_1920.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-safe-is-your-technology-security-vulnerabilities-in-2021\/", 
		"post_date": "2021-04-07 04:52:00"
	}, 
	{
		"post_id": "108", 
		"post_category_id": "1", 
		"post_title": "How to Prevent Business Email Compromise (And Other Things You Should Know About BEC)", 
		"post_content_short": "With business email compromise, a single email can cost a company millions. &nbsp;Find out how they work… and how to protect your business.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/108\/sergey-zolkin-_UeY8aTI6d0-unsplash.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-to-prevent-business-email-compromise-and-other-things-you-should-know-about-bec\/", 
		"post_date": "2021-03-02 23:45:00"
	}, 
	{
		"post_id": "99", 
		"post_category_id": "1", 
		"post_title": "How To Protect Your Business From Ransomware (The Full Story)", 
		"post_content_short": "Ransomware is one of the most dangerous cyber threats a business faces. Here’s everything you need to know about it.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/99\/pexels-life-of-pix-4291.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/how-to-protect-your-business-from-ransomware-the-full-story\/", 
		"post_date": "2021-01-20 12:13:00"
	}, 
	{
		"post_id": "96", 
		"post_category_id": "1", 
		"post_title": "Phishing Attacks: How Scammers Reel You In (And What To Do About It)", 
		"post_content_short": "Phishing is one of the most common cyber crimes you’re likely to face. What is it, and how to deal with it? It’s all in our latest blog.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/96\/fly-fishing-1149502_640.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/phishing-attacks-how-scammers-reel-you-in-and-what-to-do-about-it\/", 
		"post_date": "2020-12-02 05:30:00"
	}, 
	{
		"post_id": "90", 
		"post_category_id": "1", 
		"post_title": "The Top 5 techniques used to hack your password", 
		"post_content_short": "Passwords are often easy to crack, reused and, in today’s era of&nbsp;biometrics&nbsp;and cryptography, are an outdated way of protecting an\n\taccount. In this weeks blog find out some of the most common, and most effective, methods for stealing passwords that lead to data breaches.", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/90\/hacked.png", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/the-top-5-techniques-used-to-hack-your-password\/", 
		"post_date": "2020-10-14 07:00:00"
	}, 
	{
		"post_id": "80", 
		"post_category_id": "1", 
		"post_title": "What to look for in a Cyber Insurance policy", 
		"post_content_short": "No company is immune from a cyber attack. In this week's blog we look at the must haves in a Cyber Insurance policy and some real life\n\tclaims examples&nbsp;", 
		"post_icon": "https:\/\/www.fortitech.com.au\/media\/website_posts\/80\/server-room.jpg", 
		"post_content_type": "page", 
		"post_content_url": "https:\/\/www.fortitech.com.au\/blog\/what-to-look-for-in-a-cyber-insurance-policy\/", 
		"post_date": "2020-07-08 05:43:00"
	}
]