Nov Agenda Mag Gec Chamber 17/10/18 12:31 Pm Page 1
Total Page:16
File Type:pdf, Size:1020Kb
Nov Agenda Mag _GeC CHamber 17/10/18 12:31 pm Page 1 A WORD FROM THE GOSFORD/ERINA & COASTAL CHAMBER OF COMMERCE AND INDUSTRY INC. ESTABLISHED 1947 Presidents Report Welcome GOSFORD, A PLACE TO Here at the Chamber we endorse the UDF and applaud the State Government for WORK, LIVE AND PLAY their actions aimed at giving Gosford a to our new new life. Developing the city and the The NSW Planning Minister, The Hon. identified precincts will be key to our city’s Anthony Roberts, delivered the long future. The real works starts now where members awaited Urban Development Framework we need to be working on funding and (UDF) designed to pave the way for a opening the doors for more public private Rdconsult revitalised Gosford City. partnerships on development where appropriate. Delivering the framework and plan to ADW Johnson over 200 guests at the Gosford, Erina and Also last week Gosford played host to the Coastal Chamber of Commerce (GEC Hon. Scott Morrison, Prime Minister of Hitech Support Chamber) October lunch event, on behalf Australia, accompanied by Federal of the NSW Government, Minister Roberts Member for Robertson Lucy Wicks, was a COAST Publishing launched the finalised package of welcomed visitor the city where he planning controls for the revitalisation of outlined his plans to continue the Gosford City Centre. The NSW State government’s commitment to Blue Moon Financial Government recognised that Gosford has employment and the economy. He also Consultants been neglected for more than a decade spoke about their continued and now is the time to make “Gosford the commitment to small business after SV Partners City it should be”. being questioned on this by the Chamber. Replicating the State Government’s Finally, The Chamber has seen a return of Distinct Accounting involvement that revitalised Newcastle the current board which allows the & Advisory and Parramatta, the NSW Government continuation of the great work done to has given a commitment to Gosford and date in brining the business community Janene Stobbs the Central Coast. Minister Roberts went back together. I am proud to lead our on to address the 200 guests at the GEC Chamber for another 12 months and look Jirwander & Company Chamber lunch on Wednesday 10th forward to a great year. I recognise that October where he made a clear and direct we are a member organisation and as statement that Gosford will be a place to such we are here to advocate on behalf of Central Coast BAS, “work, live and play’. business. Our next event will be the 14th Bookkeeping & Payroll November and will feature a spotlight on The Minister participated in a Q&A Panel the plight of the retail sector. As our with Coordinator General for the Central Reads Group Pty Ltd second largest employing industry we Coast Lee Shearer and Hunter & Central rely heavily on retail to fuel the local Coast Regional Development Corporation Aspect Z economy and to continue to deliver CEO Michael Cassel to answer questions employment and growth opportunities. from the business community about the A S Digital We hope to see you there. Gosford Urban Design Framework (UDF) and the way forward to capitalise on Until next month, Wiseberry Coastal government and private sector Regards, Rod Dever - President investment. The ever changing Guest Speaker: Jack Zervos Jack has lead organisations across the supply chain from manufacturing to retail, SAVE THE DATE working with some of the biggest brands in the region in both family and public world of retail enterprise. He was formerly Group General Manager of AH Beard a fourth generation family manufacturing business; National Operations Manager for the Pacific Brands Home Comfort Group (Dunlop Foams, Tontine, Sheridan and FOR OUR Sleepmaker); Group General Manger – Business Development Fantastic Wednesday Furniture and Managing Director Stienhoff Australia (Freedom Furniture). He has been in private practice as a Brand Manager and consultant to industry NEXT EVENT 21st November groups specialising in employment matters since 2009 and is currently a working Director in a Sydney based retail business with 18 stores across three 2018 states employing 75 staff. Tel: 02 4323 1735 | E: [email protected] | FB: Gosford/Erina & Coastal Chamber of Commerce and Industry Nov Agenda Mag _GeC CHamber 16/10/18 9:18 am Page 2 I.T. INFRASTRUCTURE ADVICE UNFORTUNATELY, A BUSINESS WAS HARMED IN THE MAKING OF THIS TRUE STORY From Loyal I.T. Solutions “couldn’t happen to us”. So how can this happen to so many “Your files have been encrypted. businesses and individuals? Please submit payment within Let me go back to describing hackers and their methods. Originally, hackers would do it for the notoriety. These days’ they have 48 hours to restore your data.” graduated because computers are very powerful devices, they have learned a lot, they consider their chances of getting caught to be slim and they now have access to some very sophisticated Can you imagine turning on your computer tomorrow and finding tools. Bruce Schneier, an American cryptographer, computer all of your business data inaccessible? Could you continue trading, security specialist, and writer said, ‘attacks only get better; they or would your business come to a halt? This is the precise scenario never get worse’. There is also Bitcoin and other cryptocurrencies a small Central Coast business was recently faced with. which are digital currencies being used to buy and sell items This business operates a busy office in the Gosford area. Like so anonymously on the internet. Think of these currencies as many people these days, they revelled in the ability to complete untraceable internet cash. Now the hackers have a way of being work remotely from the comfort of home. But without the right anonymously paid. Recall our Central Coast victim? Their ransom security in place, the open connection to the network was like an was issued in Bitcoin. unlocked door, and it was all too easy for hackers to gain access to The challenge for any hacker is to gain access to your data storage the company’s files. (your laptop, server etc). There are many vectors for infection (the Who are these hackers? Anyone with an internet connected placing of a malicious operating software in your system), and computer is capable of attacking you. With anonymous many methods where you can be ‘tricked’ into letting the infection cryptocurrencies and the ability to attack victims across the globe, in, including spam, social engineering, malicious advertising cybercrime is virtually untraceable and has little to no and/or ways the hacker can ‘break in’, including website hacking, consequences, making hackers more motivated than ever. exploiting insecure remote access and insecure communications, What are they after? Your data and information, because it is aging equipment, vulnerabilities in software or equipment, are a extremely valuable to you and is also valuable for trade on the dark few methods. web. Your business data is like currency. Even in a small to medium In the example of the Central Coast business, it was all too easy for business, data is just as attractive to hackers as a corner store cash a hacker to ‘break in’ via the remote access. But why this business? register. Well, it wasn’t personal…. it’s random plus vulnerability. A hacker Hackers have two options with your data. can go on any number of public websites that lists every device open to the internet and can apply his or her automation tools to 1. They recognise that its worth more to you than it is to them, so choose targets to attempt to hack into. If you are reading this on they encrypt it (locking your files) and hold your business data your computer right now and you’re online, your IP address is one for ransom. of millions around the world that may come up in such a search. 2. They recognise that the data is valuable to them as well. Your The internet is an interconnected network consisting of customers’ bank details, credit card numbers, and Medicare approximately four billion internet addresses. These addresses are numbers fetch high prices when sold on the dark web. Once called Internet Protocol (or IP) addresses and it is how all sold, such data is often used to commit identity fraud. A data communication occurs on the internet, and within every computer breach like this could have a huge impact on the life of your clients. network. Behind each IP address can be any number of computers in business or home networks. Hackers don’t necessarily have to The situation faced by this Central Coast business falls squarely into scan the internet looking for vulnerabilities themselves. They utilise the first example of how hackers make money from your mistakes. products such as Shodan (like a ‘Google for hackers’) and Masscan, Through inadequate security measures, a hacker gained access to meaning they can scan all four billion internet IP addresses, looking their server, encrypted all of their files, and then issued a ransom for vulnerabilities in less than six minutes. If a vulnerability or note for 0.8 Bitcoins (at present value - approximately A$7,500.00). insecure practice is found, the hacker will look to leverage this into The files were largely worthless to the hacker, BUT were the an attack. They don’t necessarily know you, they just know your IP currency and life blood for the business. address is vulnerable and they will try to exploit it to see if they can They thought they had adequate security and they thought this earn some money. The Agenda Magazine supplement | The voice for Business, Commerce & Industry | Improving business conditions Nov Agenda Mag _GeC CHamber 16/10/18 9:25 am Page 3 I.T.