ethiSEC can help your business

We specialise in helping businesses with their technology through expert IT and security consulting services
our services →

expert & professional services

  • IT & information security consultancy

    We specialise in Information Security consulting including;

    • business technology and security assessments
    • security architecture design and reviews
    • ISO27001 ISMS gap assessment and recommendations
    • PCI-DSS compliance/readiness assessments
    • compliance and vulnerability testing
    • automated white-box penetration testing
  • business technology solutions

    We specialise in providing tailored technology solutions in Information Security and Data Networks. Our services include architecture, design and implementations with the following technology disciplines;


    • Firewalls
    • Endpoint protection
    • Network solutions
    • Telephony - PBX and Voice over IP (VoIP) solutions


  • next generation firewalls

    ethiSEC is highly experienced in Next Generation Firewall (NGFW) design and installations. NGFW provide the functionality to help protect your business from viruses, malware and spyware. They also protect your network from known threats with their intrusion detection and prevention capabilities. 

estimated_quoteArtboard 3

need security?

Contact Us

our services

  • find out more

    satisfied clients

    quotes2Artboard 2

    expert tips

    By Jason Ross 21 Jun, 2019
    A next generation firewall (NGFW) is a security device that can monitor and control the traffic that comes in and out of your network. They are crucial in protecting you or your business from external threats, sitting between your internal network and the internet blocking malicious traffic, viruses and attacks. Using a NGFW can be a cost effective way for small and medium enterprises (SME's) to protect their business, with the majority of NGFW offering: • Intrusion provention systems – stopping attacks before they get into your network, blocking malware and Advanced Persistent Threats (APT) • URL filtering – a tool used to prevent employees from accessing sophisticated scams and threats • Comprehensive network visibility – giving you the ability to see which applications and websites are being used on your network and activity across all users and devices • Network sandboxing – a safe space to send any suspicious files for examination • Global threat intelligence and detection– this is a tool where threat intelligence is utlisied to automatically scan your network, applications and content to identify any new and unknown threats Contact us for more information about NGFW and how they can protect your business.
    By Andrew Bell 17 Jun, 2019
    Unfortunately scammers in the digital age are becoming even more sophisticated in their attempts to get your small or medium enterprise business to hand over money or steal valuable information. The Australian Competition and Consumer Commission (ACCC) reported that in 2017, Australian business lost $4.7 million as a result of a scam, with smaller business being specifically targeted (ACCC, 24th May 2018). Online scams targeting SME businesses include: • Malware and ransomware – where scammers send emails, social media messages or file downloads like videos, files or games imbedded with a link to take you to a fake website. Scammers uses the links to infect your computer or network with software that can block access to your computer and demands a ‘ransom’ be paid. They might install software to watch what you are doing or steal your personal information and commit a fraudulent crime. • Phishing - this typically involves a scammer impersonating a bank, service provider, or government agency via email, text or voice calls. They usually alert you to a fake problem like ‘unusual activity on your credit card’ and ask you to verify who you are with your bank details. They will then use this information to steal money or commit other fraudulent crimes. • false billing – there are a number of types of false billing scams which send an unsolicited invoice for payment, renewal notice or subscription which you have not requested. There are also incidents where scammers impersonate your suppliers claiming “they have changed back accounts”. The good news is that you can take preventative action to protect your business from scams. 1. Awareness – be aware and alert. Know that scammers are out there actively targeting your business. Educate your employees and Subscribe to the ACCC Scamwatch radar alerts . 2. Keep your business information secure – never provide your information to anybody you don’t know or trust. look at using a NGFW and anti-virus endpoint protection keep your applications and software versions up to date encrypt your wireless network always use password protection, use strong passwords Back up your data Do not open or click on suspicious emails, texts or attachments –sometimes the fakes are very good. Learn how to spot a phishing email Know who your’e dealing with - never provide your information to anybody you don’t know or trust. Do your own research. Check out ASIC’s list of companies you should not deal with Learn how we can help protect your business from scams.
    hacked passwords that lead to compromised accounts.
    By Jason Ross 29 May, 2019
    Pa sswords are often the only security mechanism that protects our digital lives; for example, your password is the only protection applied to your email, banking or healthcare details. Good passwords are the crucial foundation component of your online security. Unfortunately, people choose terrible passwords and hackers know this. Why may you ask? Probably because good passwords are hard to remember and hard to type for many of us. Hackers know we often choose lousy passwords, as a result, they make use of freely available automated tools to "hack" your accounts. Often these hacks or attacks are opportunistic, sometimes they're targeted. There are several well-publicised examples where peoples social media accounts have been compromised. In some of these examples money has been stolen, often the attacker may try to embarrass you by posting inappropriate content to your pages, sometimes they may delete your account(s) that you may rely on for your business. how they obtain your password There are many ways your passwords can be compro mised, here are three . A standard method is to send you an email that looks like it's from Facebook as just one example, where they'll say you need to update your account details. If you fall victim to this attack you may supply the attacker with everything they need to access your accounts and not just your Facebook account. This is called a Phishing attack, and it's a common tool in the hackers toolbox because they work. As the attckers evolve their campaigns they look more legitimate to most people, even experts like us. Sometimes the attacker may use a hacking tool to execute an automated dictionary attack of known or commonly used passwords. These tools, once setup will run until they obtain a result the attacker can exploit. Sometimes all the attcker may need to do is perform a search on Have I Been Pwned which may provide them with a valid password they can use. Why do they look for passwords from previously compromised sites? Becasue most people will reuse their passwords elswhere! common passwords Many sites on the Internet will often publish a listing of the top 10 or 25 passwords in use each year. When you look at these (below), you see many of these passwords use common keystroke patterns such as "qwertyuiop". Some examples of common passwords are:
    More Posts
    Share by: