Skip to main content

Blog & News

Queensland’s Own Cryptoloc Sets New Global Security Standard with Microsoft 365 Integration

February 20, 2024
New Integration Empowers Small Businesses with Advanced Security and Convenience. In an announcem…

What to do in the event of a breach

September 19, 2023
What to do in the event of a breach Recovery from a ransomware attack can be a challenging and so…

How to protect yourself against ransomware

September 14, 2023
How to protect yourself against ransomware What is Ransomware? First things first… What exactly i…

What makes Cryptoloc special

September 8, 2023
What makes Cryptoloc special Simplicity Meets Strength Engage with the Cryptoloc Cloud without ha…

As safe as houses: The risks and rewards of technology for the property sector

September 12, 2022
The days when physical contracts were needed to buy and sell property are gone forever. But as th…

As easy as 1.0, 2.0, 3.0: What Web 3.0 means for the future of data security

August 8, 2022
By Melissa Crossman, Chief Executive Officer of Cryptoloc  The next phase in the evolution o…

Why you need a data audit trail

August 2, 2022
Do you know who has access to your data – and what they’re doing with it? When it comes to protec…

10 telltale signs you’ve been hacked 

June 27, 2022
Do you ever get the feeling your computer is trying to tell you something? Here are 10 telltale s…

Word up: Why passwords aren’t enough to protect your data

June 24, 2022
Passwords have long been the first line of defence against cyber intruders. They’re one of the ol…

How much is your data actually worth?

June 9, 2022
By Jamie Wilson, Founder and Managing Director of Cryptoloc As our world gets smaller, and our sy…

How to protect your digital legacy

March 7, 2022
By Jamie Wilson, Founder and Managing Director of Cryptoloc From your birth certificate to your w…

The Wright Stuff: Meet Cryptoloc’s new Customer Success Manager

February 28, 2022
Cryptoloc is pleased to welcome Katrina Wright to the team as our new Customer Success …

The cybersecurity trends you need to know about in 2022

January 5, 2022
By Jamie Wilson, Founder and Managing Director of Cryptoloc In this article: In 2021, no sector o…

The cost of ransomware: Should you pay the ransom?

January 5, 2022
By Jamie Wilson, Founder and Managing Director of Cryptoloc It might be the most difficult decisi…

Threat Level: Olympics – How many cyber attacks were attempted on the Tokyo Games?

December 1, 2021
In the latest episode of the ‘Jamie Versus The Hack’ podcast, we break down how the Tokyo Olympic…

How secure are the major cloud storage providers?

December 1, 2021
In the wake of COVID-19, most of us are more dependent on cloud storage services than ever. Uploa…

This time it’s personal: Why we’re starting the Jamie Versus The Hack podcast

October 25, 2021
By Jamie Wilson, Founder and Chairman of Cryptoloc Things aren’t normal. Even before that pesky t…

Why Australia is enacting emergency cybersecurity laws

October 13, 2021
Emergency alert! Australia’s Federal Parliament is preparing to pass emergency laws to help fend …

Less than zero: How Zero Trust works and why it matters

October 13, 2021
Who do you trust? If you’re serious about protecting your network, the answer is simple – absolut…

Why are cyber insurance premiums going up, and how can you get a better deal?

October 5, 2021
It may not have attracted as much attention as the coronavirus, but ransomware has become a pande…

The real cost of cybercrime

October 1, 2021
Being hacked is about much more than just financial losses – and yet it’s about that, too. This i…

Decoded: Cybercrime jargon explained

September 22, 2021
Can’t tell your malware from malarkey? Do you think phishing is something you do with your mates …

Blurred lines: How your employees’ home WiFi connection could be putting your data at risk

September 1, 2021
With society on a rollercoaster ride of lockdowns and social restrictions, working from home has …

The shift in cybersecurity: It’s time to stop focusing on your perimeter and start focusing on your data

September 1, 2021
It’s a sad fact of life in 2021 that cyberattacks are inevitable and data breaches are highly lik…

Why encryption is a must for business owners

August 23, 2021
How valuable is your data? Can you afford to lose it? If not, it’s time to consider the role that…

The new cartels: Who’s behind the rise in cyber crime?

August 4, 2021
Forget the Hollywood stereotype of the lone hacker living in his mother’s basement and plotting h…

Tough new cybersecurity rules on the way for Australian businesses

July 20, 2021
Australian businesses could be made to meet minimum cybersecurity requirements and face tougher p…

How to explain cyber risks to your leadership team

June 28, 2021
When it comes to communicating cybersecurity risks to boards and executive leadership teams, IT p…

Brisbane cybersecurity company Cryptoloc nabs three awards at the Global InfoSec Awards

May 20, 2021
Cryptoloc has taken out three awards in the coveted Global InfoSec Awards held during RSA Confere…

The Rise of Ransomware: Understanding the Surge in Cyber Extortion

April 27, 2021
Ransomware is on the rise, and it’s not slowing down. Cryptoloc founder and chairman Jamie W…

Why the mining industry should be taking cybersecurity seriously

February 22, 2021
Cybersecurity is a dangerous blind spot for the mining industry – but it shouldn’t take a catastr…

Symmetry in motion: How math is used in cryptography to fortify cybersecurity

February 15, 2021
Symmetry isn’t just the key to a beautiful painting or a pretty face – it’s also a key concept in…

What’s the difference between a digital signature and an electronic signature?

February 15, 2021
With each passing year, the act of adding a ‘wet ink’ signature to a physical contract feels more…

Hacks in history: What businesses can learn from the ANU cyber attack

February 15, 2021
In a cyber attack so sophisticated that it shocked even the most experienced Australian experts, …

Blockchain has hit a stumbling block, but there is a better way

February 15, 2021
The seemingly infinite potential of blockchain technology to transform a variety of industries ha…

Cyber crime reported every 10 minutes in Australia: report

November 24, 2020
Online scams are taking their toll on Australian computer users, with a cybercrime being reported…

2020 has been the year of the cyber attack: report

November 24, 2020
Security firm Crowdstrike has reported there were more cyber attacks in the first half of 2020 th…

What does a hacked coffee machine look like?

November 24, 2020
Imagine if making your morning brew had the ability to torment you while also demanding a ransom …
Stay up to date on social media