Women In Security Magazine Issue 11

Page 68

KAREN STEPHENS Karen is CEO and co-founder of BCyber, an agile, innovative group that works with SMEs to protect and grow their businesses by demystifying the technical and helping them to identify and address cybersecurity and governance risks. In 2021 Karen graduated from the Tech Ready Woman Academy’s Accelerator and the Cyber Leadership Institute’s CLP programs.

C O L U M N

Keep calm and carry on As I sit down to write this Australians find themselves knee deep in the Optus data breach.

3. Build cyber knowledge into your DNA. Tick-thebox cyber training leads to complacency and a false sense of security. Training and education

It is all very good to say “keep calm and carry on”

must be continuous, relevant and fun.

but the 9.8 million Australians who may have been affected (and some say the figure could be as high as

4. Patch everything, patch often, patch now. Do

11 million) is a substantial portion of our population,

not make it easy for cybercriminals to exploit your

which stands at around 25 million. So, I fear this

business. Keep your patches up to date on all

message is perhaps not getting through to those who

devices; business and personal.

need it the most. 5. Speak business not tech. Never assume your As always it is important to have good cyber hygiene

business contacts understand what you are

at both a personal and a corporate level. So, while the

saying. There are many interchangeable terms out

mainstream media keeps on feeding the fire of fear

there. ATO, is it Australian Tax Office or Account

and confusion, we need to keep our heads when all

Takeover? Assets, do you want to invest in shares,

about us are losing theirs (with thanks to Mr Kipling)

property, fixed interest accounts or cash, or do you

and focus on ensuring we get the basics right. Here

mean software and hardware? There are many

are six basics to get you started on the cyber secure

more examples, but you get the gist.

journey. 6. Practice makes perfect. When you have a 1. Assessment. You cannot protect what you are

ransomware breach, that is not the time to discuss

not aware of. You cannot educate those you do

how to handle it. The better prepared you are, the

not understand. A good assessment includes both

better your business will handle the breach.

qualitative and technical quantitative components. And do not forget to include your website! 2. Good password hygiene. We saw how important this was during the recent RI Advice court case. While it may be tempting to use a password more than once, to share it (to keep software costs down) or even to choose one you can easily remember, don’t. You need passphrases or a complex password containing 16 alphabetic and non-alphabetic characters for everything: business,

www.linkedin.com/in/karen-stephens-bcyber

www.bcyber.com.au

karen@bcyber.com.au

twitter.com/bcyber2

youtube.bcyber.com.au/2mux

personal, the lot.

68

W O M E N I N S E C U R I T Y M A G A Z I N E

N O V E M B E R • D E C E M B E R 2022


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Gabrielle Raymundo

5min
pages 128-129

Haicheur Ichrak Amani

3min
pages 130-133

Jack K

2min
page 127

Kao Hansell

7min
pages 124-126

Oorja Rungta

6min
pages 122-123

Out of the shadows: how cybersecurity has taken centre stage in the Australian business arena

3min
pages 118-121

Key themes from 2022 taking us forward

4min
pages 116-117

neural networks and cybersecurity

2min
pages 114-115

Reflections on malware

4min
pages 112-113

Sharing our inner voice stories

7min
pages 108-111

behind cryptocurrency

3min
pages 106-107

Improving security together

3min
pages 102-105

Meeting the security and privacy challenges of the metaverse

1min
page 101

How is the industry responding to the skills and talent squeeze?

4min
pages 98-100

Looking back to move forward: thirty years of experience guiding the way

2min
pages 92-93

Corporate layoffs: a perfect storm for insider risk and the imperative for holistic mitigation approaches

7min
pages 88-91

Cyber resilience in the cyber world

4min
pages 85-87

2022 has been a watershed year for cybersecurity, but what’s next?

5min
pages 82-84

not fill you with dread

4min
pages 80-81

The future of developer security maturity is bright, and these verticals are leading the charge

4min
pages 78-79

Australia’s cybersecurity sector: where are the women?

5min
pages 74-77

you need to reach your vision

12min
pages 54-59

Keep calm and carry on

10min
pages 68-73

Women in cyber security from a recruiters perspective

4min
pages 52-53

Changing the ‘change’ journey

4min
pages 50-51

to cybersecurity

4min
pages 48-49

A real hard look

3min
pages 46-47

Scarlett McDermott

4min
pages 34-35

Jessica Williams

4min
pages 32-33

Cybercrime in 2022

1min
pages 14-15

Emily Goodman

3min
pages 30-31

Dina Atwell

4min
pages 24-27

Joyce Tiwari

2min
pages 18-19

Tara Murphy

2min
pages 28-29

Ranjeeta Rani

2min
pages 20-21

Annelies Moens

3min
pages 16-17

Sandy Assaf

3min
pages 22-23
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.