<?xml version="1.0" encoding="UTF-8"?>
<root>
  <posts>
    <post_id>248</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Cyber Security incident hits Brisbane Law Firm]]></post_title>
    <post_content_short><![CDATA[This weeks blog is a report written in response to a cyber incident involving a Brisbane Law firm who found themselves caught up in a scam centered around unauthorised access to the Microsoft 365 account of the firms Office Manager, Susie and the subsequent activity undertaken
under the account by the unauthorised party.<br />
<br />
Our blog provides a summary of the incident, remediation steps undertaken, an outline of the firms existing technology landscape
and post-incident recommendations. It also highlights the importance of <a href="/services/staff-security-awareness-training/" target="_blank"><strong><span style="color: #1c79c0;">Security
Awareness Training</span></strong></a>
and strong cyber security practices are for your business.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/248/law-(1).png</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/cyber-security-incident-hits-brisbane-law-firm/</post_content_url>
    <post_date>2024-12-04 03:06:00</post_date>
  </posts>
  <posts>
    <post_id>225</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Strengthen Your Business Defenses with Managed Detection and Response (MDR)]]></post_title>
    <post_content_short><![CDATA[With cybercriminals constantly evolving their tactics, traditional antivirus solutions might not be enough to keep your valuable data safe. This is where Managed Detection and Response (MDR) comes into play, offering a proactive approach to cybersecurity that every business
should consider.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/225/tdlogo.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/strengthen-your-business-defenses-with-endpoint-detection-and-response-edr/</post_content_url>
    <post_date>2024-03-06 11:37:00</post_date>
  </posts>
  <posts>
    <post_id>207</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[What is Email Antispam and how can it help your business?]]></post_title>
    <post_content_short><![CDATA[Are you a small business owner, constantly wrestling with a tidal wave of junk emails clogging up your inbox? You're not alone. Email spam
	has evolved into a major headache for businesses across Australia. But there's a solution: email antispam, find out what it is and how
	it can help your business in our latest blog.
]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/207/antispam-5.png</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/what-is-email-antispam-and-how-can-it-help-your-business/</post_content_url>
    <post_date>2023-07-19 01:54:00</post_date>
  </posts>
  <posts>
    <post_id>175</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[What is Advanced Endpoint Detection & Response and how can it help your business?]]></post_title>
    <post_content_short><![CDATA[Malware is now the overarching term used to describe software engineered to do something nasty to a computer, but how can your protect yourself? Find out in our first blog of 2023.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/175/photo-1635338349068-e1b91866217e.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/what-is-advanced-endpoint-detection-and-response-and-why-do-you-need-it/</post_content_url>
    <post_date>2023-01-04 03:22:00</post_date>
  </posts>
  <posts>
    <post_id>171</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How to create and maintain strong password management]]></post_title>
    <post_content_short><![CDATA[We are all familiar with passwords. A typically annoying to type in combination of letters, numbers, and symbols that when entered in the
	correct sequence, grant access to your account. It’s a simple premise, but compromised passwords happen all the time. Without the right
	strategy for creating, storing, and updating passwords it’s only a matter of when, not if, a password belonging to a service important to
	you or your business is compromised too. Find out how to maintain secure password practices in this weeks blog.
]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/171/PWM.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-to-create-and-maintain-strong-password-management/</post_content_url>
    <post_date>2022-11-28 10:57:00</post_date>
  </posts>
  <posts>
    <post_id>169</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Tips for Identifying Phishing & Business Email Compromise Attempts]]></post_title>
    <post_content_short><![CDATA[Often referred to as the internet's cockroach, email has outlived all other forms of internet communications and has infested every corner
	of the globe. Operating your business without email is unimaginable. Hackers, fraudsters, and con artists know this, making your inbox their
	attack vector of choice. Email based attacks are easy to automate, cost nothing to send and they work because people keep opening their
	messages. Find out how you can combat it in our latest blog.
]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/169/agence-olloweb-d9ILr-dbEdg-unsplash.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/tips-for-identifying-phishing-and-business-email-compromise-attempts/</post_content_url>
    <post_date>2022-08-16 04:37:00</post_date>
  </posts>
  <posts>
    <post_id>168</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Setting up Cybersecurity Policies and Processes for Business]]></post_title>
    <post_content_short><![CDATA[A cybersecurity assessment helps your business fully realise your legal and professional cybersecurity obligations. But where do you start?
Find out more by reading our blog.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/168/jeshoots-com-fzOITuS1DIQ-unsplash.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/setting-up-cybersecurity-policies-and-processes-for-business/</post_content_url>
    <post_date>2022-08-03 05:54:00</post_date>
  </posts>
  <posts>
    <post_id>162</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[The benefits of using a VPN]]></post_title>
    <post_content_short><![CDATA[When you hear the term “virtual private network”  or VPN you might think it’s something too high-tech for the average user and
	there’s no reason why they should use a VPN. But there are many business benefits to using a VPN, find out more in our blog.

<br />]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/162/pexels-stefan-coders-2064586.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/reasons-why-everyone-should-use-a-vpn/</post_content_url>
    <post_date>2022-07-27 02:22:00</post_date>
  </posts>
  <posts>
    <post_id>155</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How to Protect your Business on Microsoft and Apple]]></post_title>
    <post_content_short><![CDATA[Whether your business relies on Microsoft Windows OS or Apple Mac OS, the risk of cyber-attack is high without superior security measures.
Find out about the threats and how we can help you stay ahead of them in our latest blog.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/155/security-g821675289_640.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-to-protect-your-business-on-microsoft-and-apple/</post_content_url>
    <post_date>2022-06-29 04:52:00</post_date>
  </posts>
  <posts>
    <post_id>129</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Top 5 things must haves in a personal Password Manager]]></post_title>
    <post_content_short><![CDATA[Using one of the best password managers is the single best way to boost your online security. There will be no more need to remember
	dozens of long, complicated passwords. Instead, you'll have just one long, complicated password or even your fingerprint that can unlock
	all the rest. Find out about the top 5 must haves for personal password manager tools in our blog.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/129/Consumer-IOT.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/personal-password-management-tools/</post_content_url>
    <post_date>2022-01-11 22:31:00</post_date>
  </posts>
  <posts>
    <post_id>133</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Australian IT User and Cyber Security Policy template]]></post_title>
    <post_content_short><![CDATA[Looking for a great template to get your business thinking about its technology infrastructure, where it is and how it is protected and
	prompt you to regularly review these processes? Then look no further, explore our blog and grab yourself a copy of our free IT User and
	Cyber Security Policy template.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/133/IT-Policy.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/it-user-and-cyber-security-policy-template/</post_content_url>
    <post_date>2021-09-15 05:23:00</post_date>
  </posts>
  <posts>
    <post_id>124</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How often should a business replace their computers?]]></post_title>
    <post_content_short><![CDATA[This week we helped a legal client evaluate their current hardware assets to determine which were candidates for replacement and which
	might be able to to have a hardware upgrade to extend their usable life.  Find out the results in our latest blog.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/124/Computer-upgrades.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-often-should-a-business-replace-their-computers/</post_content_url>
    <post_date>2021-07-21 04:29:00</post_date>
  </posts>
  <posts>
    <post_id>109</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How Safe Is Your Technology? Security Vulnerabilities In 2021]]></post_title>
    <post_content_short><![CDATA[Security vulnerabilities aren’t a problem… until they are. Here’s how they work, and how to protect yourself from them.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/109/fingerprint-2904774_1920.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-safe-is-your-technology-security-vulnerabilities-in-2021/</post_content_url>
    <post_date>2021-04-07 04:52:00</post_date>
  </posts>
  <posts>
    <post_id>108</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How to Prevent Business Email Compromise (And Other Things You Should Know About BEC)]]></post_title>
    <post_content_short><![CDATA[With business email compromise, a single email can cost a company millions.  Find out how they work… and how to protect your business.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/108/sergey-zolkin-_UeY8aTI6d0-unsplash.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-to-prevent-business-email-compromise-and-other-things-you-should-know-about-bec/</post_content_url>
    <post_date>2021-03-02 23:45:00</post_date>
  </posts>
  <posts>
    <post_id>99</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[How To Protect Your Business From Ransomware (The Full Story)]]></post_title>
    <post_content_short><![CDATA[Ransomware is one of the most dangerous cyber threats a business faces. Here’s everything you need to know about it.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/99/pexels-life-of-pix-4291.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/how-to-protect-your-business-from-ransomware-the-full-story/</post_content_url>
    <post_date>2021-01-20 12:13:00</post_date>
  </posts>
  <posts>
    <post_id>96</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Phishing Attacks: How Scammers Reel You In (And What To Do About It)]]></post_title>
    <post_content_short><![CDATA[Phishing is one of the most common cyber crimes you’re likely to face. What is it, and how to deal with it? It’s all in our latest blog.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/96/fly-fishing-1149502_640.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/phishing-attacks-how-scammers-reel-you-in-and-what-to-do-about-it/</post_content_url>
    <post_date>2020-12-02 05:30:00</post_date>
  </posts>
  <posts>
    <post_id>90</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[The Top 5 techniques used to hack your password]]></post_title>
    <post_content_short><![CDATA[Passwords are often easy to crack, reused and, in today’s era of biometrics and cryptography, are an outdated way of protecting an
	account. In this weeks blog find out some of the most common, and most effective, methods for stealing passwords that lead to data breaches.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/90/hacked.png</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/the-top-5-techniques-used-to-hack-your-password/</post_content_url>
    <post_date>2020-10-14 07:00:00</post_date>
  </posts>
  <posts>
    <post_id>80</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[What to look for in a Cyber Insurance policy]]></post_title>
    <post_content_short><![CDATA[No company is immune from a cyber attack. In this week's blog we look at the must haves in a Cyber Insurance policy and some real life
	claims examples ]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/80/server-room.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/what-to-look-for-in-a-cyber-insurance-policy/</post_content_url>
    <post_date>2020-07-08 05:43:00</post_date>
  </posts>
</root>
