The Times Australia
Google AI
The Times Technology News

.

Spotlight On Devices This Cyber Security Awareness Month: Businesses Need Complete Attack Surface Visibility To Protect Assets

  • Written by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis

The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats.

They have outlined four simple steps for all Australians to improve their cyber security – turn on multi-factor authentication; keep devices and software up to date; use strong and unique passwords and recognise and report phishing.

The spotlight on individual responsibility is encouraging and helps to address the expanding attack surface created by the ever-increasing number of devices, which in turn introduces a multitude of potential vulnerabilities. In fact, research from Armis revealed that tablets, media players, personal computers and mobile phones were among the top 10 device types with the highest number of attack attempts.

Expanding attack surface

While adopting MFA and strengthening passwords are non-negotiable in today’s threat environment, ongoing security updates and patching discovered weaknesses are equally vital. Consumers must also be educated on the threats posed by their devices through lax security protocols, standardised product class passwords and insecure use. Each unsecured device adds another layer to the expanding attack surface.

Businesses too are under threat, as devices move between personal and corporate environments, potentially encountering unsecure networks. As the proliferation of connected devices continues, it becomes imperative for organisations to monitor and manage them. They are increasingly inundated with a growing mass of devices connecting to their business-critical data and infrastructure. Nearly every business now relies on these devices for many processes through managed devices. As a result, organisations end up not knowing what or how many assets they have.

The cornerstone of effective cybersecurity for businesses is visibility

To achieve true resilience against ever-evolving cyber threats, a proactive approach is needed. This includes comprehensive identification and real-time monitoring of all connected devices, along with the ability to identify and swiftly mitigate vulnerabilities across the entire attack surface.

Just like you can’t fix a problem you don’t know exists, you can’t protect assets you can’t see. The first step is achieving complete attack surface visibility. This means identifying all connected devices, including known and unknown physical and virtual assets, that are connected to the network.

While eliminating all risks is impossible, prioritisation and continuous monitoring are crucial. By investing in real-time asset intelligence, vulnerability analysis, AI-powered threat detection and remediation, organisations can proactively mitigate and manage their cyber risk exposure.

Furthermore, organisations must keep cyber exposure front of mind. This means using AI-powered platforms to help see, protect and manage all their assets in real time against potential threats.

Doing so ensures they can proactively mitigate risks, remediate vulnerabilities, block threats and protect their entire attack surface.

Times Magazine

Freak Weather Spikes ‘Allergic Disease’ and Eczema As Temperatures Dip

“Allergic disease” and eczema cases are spiking due to the current freak weather as the Bureau o...

IPECS Phone System in 2026: The Future of Smart Business Communication

By 2026, business communication is no longer just about making and receiving calls. It’s about speed...

With Nvidia’s second-best AI chips headed for China, the US shifts priorities from security to trade

This week, US President Donald Trump approved previously banned exports[1] of Nvidia’s powerful ...

Navman MiVue™ True 4K PRO Surround honest review

If you drive a car, you should have a dashcam. Need convincing? All I ask that you do is search fo...

Australia’s supercomputers are falling behind – and it’s hurting our ability to adapt to climate change

As Earth continues to warm, Australia faces some important decisions. For example, where shou...

Australia’s electric vehicle surge — EVs and hybrids hit record levels

Australians are increasingly embracing electric and hybrid cars, with 2025 shaping up as the str...

The Times Features

How hot is too hot? Here’s what to consider when exercising in the heat

If you like to exercise outdoors, summer gives you more chance to catch the daylight. It’s often...

Vendor Advocacy Fees

Vendor advocacy fees can vary widely based on a number of factors, including the type of service...

MYA Cosmetics launches in Australia with bold new collection designed for creative tweens

MYA Cosmetics has officially launched in Australia, introducing its 2026 collection featuring th...

How smart home materials can shield us from extreme heat and cut energy bills all year

Australia is getting hotter. Climate change is driving more frequent and prolonged extreme heatw...

What is autistic burnout? And what can you do about it?

Many autistic people face challenges in their daily life while navigating a world made for neuro...

What is ‘oatzempic’? Does it actually work for weight loss?

If you’ve spent any time on TikTok or Instagram lately, you may have seen people blending oats...

Freak Weather Spikes ‘Allergic Disease’ and Eczema As Temperatures Dip

“Allergic disease” and eczema cases are spiking due to the current freak weather as the Bureau o...

The Man Behind Sydney’s New Year’s Eve Midnight Moment: Jono Ma

When the clock strikes midnight on New Year’s Eve, Sydney will ring in 2026 powered by a high-volt...

Australians Can Choose Their Supermarket — But Have Little Independence With Electricity

Australians can choose where they shop for groceries. If one supermarket lifts prices, reduces q...