Daily BulletinDaily Bulletin

Technology

  • Written by Adam Santarossa


With the rapid rise of data hacking in the Australian business sector in recent months, a new risk has immerged – cloning an entire business to steal intellectual property and ultimately income.

 

Data expert and Managing Director of EC Integrators, Emy Carr, says while many businesses were concerned about data being stolen, the new threat of ‘cloning’ took hacking to a new level.

 

“Cloning is on the rise in Australia and is relatively easy for criminals to do,” said Ms Carr.

 

“In fact, there are even step by step guides available on data cloning after a simple Google search.”

 

Jen Wells founder of Above Benchmark, a leading Mystery Shopping provider, was recently shocked to discover their website and intellectual property been cloned and reproduced with a different trading name.

 

“It’s absolutely gut wrenching to see your hard work and design being copied,” Mrs Wells said.

 

“I thought our website was protected. I had no idea people could scrape an entire website, change a few words and pass it off as their own.

 

“The cloned site was paid for with Bitcoin, so it’s very difficult to find who did this. We reported them and were relieved when the site was shut down, but a few days later they were up and running again. We’re now in the process of shutting them down a second time, but they’re getting more difficult to track down.

 

“I think the message is for the public to be very careful with the personal information they are providing on websites and job applications. You can’t assume that just because a website looks professional that you’re dealing with a legitimate business. The crooks are getting tech savvy and more advanced.”

 

While the business identity theft did not cost the business financially, and no customer data was compromised, other businesses may not be as fortunate.

 

The cost of cyber-crime to Australian business continues to rise, currently costing over $1 billion each year. 61 per cent of all data breaches in the last year occurred in businesses with fewer than 1,000 employees.

 

Ms Carr said Australian small business is often the most vulnerable to online scams and hacking, given a lack of resources and knowledge to protect themselves adequately against the threat.

 

“Australian business simply aren’t taking the required steps needed to properly protect its customers,” said Ms Carr.

 

“The rise of small and home businesses meant data breaches and issues like cloning were also increasing.

 

“Many small businesses feel they do not have the necessary budget for a sophisticated data management and cyber security plan, but the reality is that most hacks are easily defendable.”

 

Ms Carr said businesses could protect themselves from cloning and other data breaches by doing the following: 

 

  • Understand that most hacks start from a poor system password: More than 80 per cent of hacking related breaches coming from a weak or guessable password.
  • Phishing emails continue to catch small business owners out: Hackers try to get owners to open emails that install malware or convince you to give them your password. Warning signs can include incorrect spelling, email addresses and links that look different from a regular URL.
  • Use Hyper Text Transfer Protocol Secure (HTTPS), the secure version of HTTP for websites. HTTPS means all communications between your browser and the website are encrypted, protecting highly confidential online transactions like online banking and online shopping order forms.  
  • Use a robust cloud service providers: By storing information offsite on a robust cloud server it not only secures data but also have access to data backup in case of a disaster event.

 

“All businesses need to be more data aware and have proper management processes in place,” said Ms Carr.

 

“This includes identifying the sensitive data that they collect and store, such as any customer or employee personal information, credit card details, financial records, medical records, educational records, employment information.

 

“Ensure you understand where the data is captured and stored – is it digitally or in hard copies, and then who has access to it at every step of your business processes.

 

“Businesses should be encrypting data, the copies, backups so even if it’s stolen, the data is not easily jeopardised.”

 

EC Integrators is a leading information management consultancy with specialised expertise in Data Governance, Enterprise Data Management, Data Virtualisation and Business Intelligence.

For more information relating to managing data in business visit www.ecintegrators.com.au

Our helicopter rescue may seem a lot of effort for a plain little bird, but it was worth it

arrow_forward

I'm searching firegrounds for surviving Kangaroo Island Micro-trapdoor spiders. 6 months on, I'm yet to find any

arrow_forward

Double trouble: this plucky little fish survived Black Summer, but there's worse to come

arrow_forward

The Conversation
INTERWEBS DIGITAL AGENCY

Politics

Prime Minister Scott Morrison Interview with Ray Hadley, 2GB

RAY HADLEY: Prime Minister, Scott Morrison, supposed to be on holidays. He's not. He's online. Prime Minister, good morning.    PRIME MINISTER: G’day Ray. Certainly staying very close to every...

Scott Morrison - avatar Scott Morrison

Scott Morrison Covid 19 update

PRIME MINISTER: Good afternoon, everyone. Today I’m joined by Professor Paul Murphy - sorry, Professor Paul Kelly. I’ve got Brendan Murphy still on the brain. You are not far from us, Brendan. B...

Scott Morrison - avatar Scott Morrison

Prime Minister Interview with Ben Fordham, 2GB

FORDHAM: Thank you very much for talking to us. I know it's a difficult day for all of those Qantas workers. Look, they want to know in the short term, are you going to extend JobKeeper?   PRI...

Scott Morrison - avatar Scott Morrison

Business News

Fifth Dimension: Identified as one of the world’s leading strategic consultancies

Sydney based consulting company, Fifth Dimension, has been recognised for its ground breaking work, receiving a place in the GreenBook Research Industry Trends (GRIT) Top 25 Strategic Consultancie...

Tess Sanders Lazarus - avatar Tess Sanders Lazarus

Understanding Your NextGen EHR System and Features

NextGen EHR (Electronic Health Records) systems can be rather confusing. However, they can offer the most powerful features and provide some of the most powerful solutions for your business’s EHR ne...

Rebecca Stuart - avatar Rebecca Stuart

SEO In A Time of COVID-19: A Life-Saver

The coronavirus pandemic has brought about a lot of uncertainty for everyone across the world. It has had one of the most devastating impacts on the day-to-day lives of many including business o...

a Guest Writer - avatar a Guest Writer



News Company Media Core

Content & Technology Connecting Global Audiences

More Information - Less Opinion