let’s make something together

Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.

Find us

PO Box 16122 Collins Street West
Victoria 8007 Australia

Email us

info@domain.com
example@domain.com

Phone support

Phone: + (066) 0760 0260
+ (057) 0760 0560

  • SouthridgeTech

This week’s topic: Deepfakes

The evolution of technology used for cybercrime is fascinating, but scary at the same time! Deepfakes are the latest trend and can be used to craft a realistic scam when used maliciously. In this week’s security tip video, learn about deepfakes, the threats they pose, and how to spot one. Watch this week’s Security Tip […]

Read More
  • SouthridgeTech

DarkSide ransomware will now vet targets after pipeline cyberattack

Last week, the ransomware gang encrypted the network for the Colonial Pipeline, the largest fuel pipeline in the United States. DarkSide is operated as a Ransomware-as-a-Service, which consists of two groups of people. One group is the core operators and developers of the ransomware, and the other is its affiliates that are recruited to hack networks […]

Read More
  • SouthridgeTech

This week’s topic: Cloud Jacking

As more data and sensitive information are being kept in the cloud, the security risk of cloud jacking is something we all need to be aware of and protect against. In this week’s security tip video, learn what cloud jacking is and how you can keep your accounts safe and secure. Watch this week’s security […]

Read More
  • SouthridgeTech

This week’s topic: Tax Scams

Tax scams have been a staple for cybercriminals for years, but 2021 is presenting some new threats that are making this tax season very dangerous. In this week’s security tip video, learn about some common and emerging tax scams so you can be properly prepared. Click the button below to see our video. It’s not just […]

Read More
  • SouthridgeTech

This week’s topic: Webcam and Connected Device Security

Connected technology like webcams and other smart home products are booming in popularity and bringing new security risks along with them. In this week’s security tip video, learn how cybercriminals could access a connected device and the steps you can take to protect yourself. Quick Tips: Cover up your webcam when not in use. Make […]

Read More
  • SouthridgeTech

This week’s topic: What is Social Engineering?

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week’s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for. Watch out for threatening language during phone calls and emails. Offering […]

Read More
  • SouthridgeTech

Spring into Action!

Cyber threats are all around us, both at work and in our personal lives. To have the best chance at responding appropriately to a cyber-event, an incident response plan is a critical step. In this security newsletter, take a deeper dive into the incident response stages and why this plan is so critical. Quick Tips: […]

Read More
  • SouthridgeTech

Your Incident Response Plan – Part 3: Recovery and Learning

An incident response plan is not complete without the recovery and learning stages. Returning to business as usual after an incident will be the optimal goal, but learning some important lessons on how the incident could have been avoided is also important. In our third and final installment of this three-part series, learn some helpful […]

Read More
  • SouthridgeTech

Your Incident Response Plan – Part 2: Detection and Response

When creating an incident response plan, the detection and response stages are a critical component. It is important to know how to detect when an incident occurs and the appropriate response to help mitigate the damage. In part two of this three-part series, learn some important steps to help detect and respond to security incidents […]

Read More
  • SouthridgeTech

Your Incident Response Plan – Part 1: Preparation

Creating an incident response plan can help us navigate cybersecurity events outside of the office. A good plan will focus on five key areas; Preparation, Detection, Response, Recovery and Learning. In part one of this three-part series, we discuss the preparation stage of an incident response plan to help lay the foundation of a successful […]

Read More