• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

IT and CyberSecurity May Not Be Enough on its Own

You are here: Home / Security News / IT and CyberSecurity May Not Be Enough on its Own

Cybersecurity

IT and cybersecurity is an integral part of all businesses security planning. The prevailing model for most businesses when considering securing their information is to implement and integrate new IT hardware, software and firewalls. With so many examples of data breaches occurring it is important to reconsider the way we look at IT/Cybersecurity and the approach we take to ensuring business continuity.

Some threats that are seldom considered are the insider (including outsourced staff and contractors), lack of physical security controls to protect sensitive equipment and relaxed information security governance. Although listed separately they are not mutually exclusive.

Recent examples of insider threat were seen when a Bupa employee inappropriately copied and removed the details of 500,000 members. This type of data breach could have been avoided through the use of personnel security vetting and tighter access controls. Including limiting what can and cannot be downloaded from Bupa’s systems. The potential for this type of breach can be further mitigated by reducing access to server rooms/stacks that allow access to massive amounts of stored data, including tracking of who has entry to these areas, can be a great deterrent and an easily auditable way to identify personnel involved with data breaches. Simple mistakes like this can cause huge reputational and financial damage to a company.

An emerging trend in cyber-attacks is known as the fileless (in memory) attack. These are techniques allowing the attacker to bypass traditional security/antivirus technologies as they do not need to write any files to disk. Having good IT/information governance procedures in place, not opening unknown or unexpected emails/attachments, having controls for accessing only certified websites and daily shutdown/reboot can reduce the potential impact and harm of these types of attacks.  For a more generic fileless attack, simply shutting down and rebooting your computer will mitigate it. A much more sophisticated version of this type of attack was the “Wannacry” malware that recently used to shut down multiple companies and government systems worldwide.

When you are involved with the problem there is a greater chance of missing pertinent information and issues. Conducting security threat and risk assessments and creating security plans can be an arduous task for employees who are already busy dealing with the day to day activities of a company. The process of a security threat and risk assessment should be performed by reputable security risk consultants to ensure that all the vulnerabilities are Identified and are up to date with industry standards and technology.

For further information on the holistic approach to IT/Cyber Security and services we provide to help identify and mitigate risks and integrate risk controls please do not hesitate to contact Agilient.

The Agilient Team 

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane