Shane Curries Blog

Return to Business Page





Lessons learned from the CrowdStrike global outage

22/07/24 by Mr Shane Currie

In todays article, I address the topic of the CrowdStrike outage.

I address the need for professionals to implement the workaround to avoid any further issues, its best to leave this to a professional.

I discuss lessons that we can all learn form this outage, such as how testing updates in a sandbox environment can mitigate future incidents.

You can read my article by clicking on the link below

Click here to read the article





Network Intrusion Alarm System (IAS) Development: Version 2.7.1

13/07/24 by Mr Shane Currie

In todays video article, I provide a demonstration of my Network Intrusion Alarm System (IAS) version 2.7.1.

In this version, I am testing the connected modules that I purchased from JayCar. This version does not yet have network port monitoring enabled, I am simply testing if the modules work.

I have included a video presentation of prototype testing and also a video presentation of my dog Loki.

Click the link below to view.

Click here to read the article





Network Intrusion Alarm System (IAS) Development: IAS V2.7

16/06/24 by Mr Shane Currie

Shanes Computing and Networking has embarked on a new project in Artificially Intelligent Robotics Development, with a new project called the Intrusion Alarm System (IAS) 2.7.

The IAS will be capable of various tasks, such as monitoring network ports for unauthorized activity, external weather conditions, movement, ultrasonic frequencies, and soil moisture.

The IAS is being developed by using a Raspberry PI and Python programming scripting. Current challenges in this version include managing CPU temperature and testing of various lightweight AI models for better performance and custom datasets.

You can read further about the robotics development by clicking the link below.

Click here to read the article





Bar and Pokies Patron Data Potentially Compromised: Alleged Offshore Leak Affecting ClubsNSW, Businesses Advised to Verify and Implement High Encryption Standards.

02/05/24 by Mr Shane Currie

An anonymous group of offshore IT subcontractors have reportedly compromised sensitive private Australian information, including biometrics, facial recognition, drivers license details, and slot machine usage of ClubsNSW patrons

The IT contracting firm servicing ClubsNSW has confirmed that the incident is under investigation.

This article highlights the crucial need for robust encryption practices, prompting businesses to leverage encryption options and seek assistance from qualified local IT professionals like Shane from Shanes Computing and Networking to ensure data is secure and properly managed.

Click here to read the article





Beyond Plug-and-Play: Unleashing the Full Power of Your Network Firewall.

31/03/24 by Mr Shane Currie

This article delves into the critical need for advanced configuration of network firewalls, challenging the "plug-and-play" misconception in today's sophisticated corporate and organizational landscapes.

Through an engaging analogy with a VCR, I reveal that while basic functionality is straightforward, leveraging a firewall's advanced features requires skillful programming.

I explore essential topics like access control lists and intrusion detection systems, and provide examples that detail the risks of inadequate configuration..

Read the full article by clicking the button below.

Click here to read the article







Cyber Criminals are using deepfake AI to replicate business stakeholders in Zoom and MSTeams video conference calls.

13/02/24 by Mr Shane Currie

Cybercriminals are using deepfake AI to replicate business stakeholders in fake Zoom and Microsoft Teams calls, resulting in successful scams that defraud companies of millions

This article discusses the rise of deepfake replicants and emphasizes the need for businesses to safeguard against this threat. It suggests implementing network and application access controls, with a focus on using firewall rules, virtual local area networks (VLAN) and access control lists to mitigate this threat

Shane's Computing and Networking can offer a confidential, no obligation security review and provide actionable insights in protecting your business against the rise of the deapfake replicants

Read the full article by clicking the button below.

Click here to read the article





ACSC Essential 8 Simplified: Leveraging Your Current Microsoft Tech for Maximum Security & Affordably

30/01/24 by Mr Shane Currie

This article highlights cost-effective strategies for small to medium enterprises (SMEs) to comply with the Australian Cyber Security Centre's Essential 8 model using existing Microsoft tools.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article also advices how Shanes Computing and Networking, which offers affordable consultation services can help businesses implement these Essential 8 guidelines effectively.

Read the full article by clicking the button below.

Click here to read the article






2024: Time to Fortify! ASIC Survey Reveals Cyber Security Gaps in SMEs

17/01/24 by Mr Shane Currie

This article highlights ASIC's Cyber Pulse Survey findings, revealing many Australian SMEs' lack of preparedness for cyber threats.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article warns of an expected increase in cybercrime in 2024 and stresses the importance of SMEs fortifying their defenses.

Read the full article by clicking the button below.

Click here to read the article






The Silent War: Protecting MSPs and Clients from Covert Cyber Infiltration

14/12/23 by Mr Shane Currie

This article explores the heightened cybersecurity risks facing Managed Service Providers (MSPs) and their clients, emphasizing the implications of cybercriminal infiltration.

Citing warnings from cybersecurity agencies, the article delves into the specific threat of North Korean cyber criminals masquerading as IT workers to deploy ransomware.

The article advocates for the strategic hiring of local IT professionals and emphasizes proactive measures for clients and MSPs to protect against cyber threats.

Read the full article by clicking the button below.

Click here to read the article






Safeguarding Your Organizations Fortress: The Power of Monitoring TCP/IP & UDP Activity

09/12/23 by Mr Shane Currie

This article emphasizes the critical role of monitoring TCP/IP and UDP activity in safeguarding businesses from cyber threats. it explores the risks associated with remote access, illustrating the potential dangers when network communication channels go unchecked.

Citing real word examples, this article highlights the current vulnerabilities of remote work from home scenarios and how these vulnerabilities can be fortified by professional IT Staff and Contractors skilled in Network Security and Network Engineering.

Read the full article by clicking the button below.

Click here to read the article






Fortify Your Defenses: Unleashing the Power of Microsoft Exchange and SharePoint for Robust Email Security

08/12/23 by Mr Shane Currie

Emails stand out as the primary entry points targeted by cybercriminals. Typically, these malicious actors initiate attacks on businesses or organizations by deploying deceptive emails aimed at misleading staff.

This article delves into the deployment of disclaimers, email attachment blocking and review mechanisms using Microsoft Exchange. Additionally, it explores the inclusion of a Cyber Security Policy in SharePoint as a means to educate staff

Read the full article by clicking the button below.

Click here to read the article




Safeguard Your Business: Choose Local Australian IT Support Over Risky International Alternatives

23/11/23 by Mr Shane Currie

In the current political and business landscape of Australia, businesses and organizations must decide between outsourcing IT support services or employing Australian-trained IT support staff and contractors.

This article objectively explores the security risks associated with outsourcing IT support and highlights the benefits of choosing Australian-based IT support for your business or organization.

Read the full article by clicking the button below.

Click here to read the article