• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Abandoned Domain Names Available To Cybercriminals

You are here: Home / Security News / Abandoned Domain Names Available To Cybercriminals

According to the Australian Cyber Security Centre (ACSC), businesses who have abandoned their domain names are at risk of having cybercriminals snatch them for their own personal gain. A domain name is essential to businesses operating online and using email services, so losing a domain name can also mean the loss of your business’s website and email.

Aftershock of an abandoned domain name

Should your business fail to maintain a domain name, cybercriminals can benefit in obtaining the following:

  • Confidential documents of former clients;
  • Confidential documents of a former practice;
  • Private email correspondence;
  • Personal information of former clients.

And that’s not all. They will also be able to take further possible actions such as:

  • Impersonate legal practitioners to defraud former clients and fellow practitioners;
  • Regain access to the Office 365 and G Suite accounts, potentially gaining access to any email and documents not deleted on the platforms;
  • Hijack personal user accounts, such as LinkedIn and Facebook.

The ripple effect of these actions can cause serious damage to a business’s brand, and possible heavy financial losses. Which is why proper actions should be taken.

Mitigating the risk of abandoned domain names

The ACSC has provided the following counter-measures which are:

  1. Renewing the domain name and using https://whois.auda.org.au to check your domain registration
  2. Using HTTPS and SSL certificates to secure your website and connections
  3. Updating your content management platforms, plugins and programs
  4. Apply Multi-Factor Authentication (MFA) and stronger passwords
  5. Close user accounts that were registered using the business email address
  6. Change or remove business emails from online user accounts
  7. Unsubscribe to notifications containing sensitive information
  8. Advise clients to update their address books

To learn more about how to manage and plan your business’s security frameworks and implement the latest in security policies, don’t hesitate to contact us at Agilient.

Author: Saeed Baayoun, Agilient Consultant

Tweet
Share

General,  Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane