Cyber Security

Cyber Security Tips and Advice

Cyber Hacker with skeleton mask and computer reflected in glasses

The following content is based around the Small Business Cyber Guide and the Easy Steps Checklist pubslished by the Australian Cyber Security Centre.

For more comprehensive information visit www.cyber.gov.au

On 6 August 2020, the Australian Government released Australia’s Cyber Security Strategy 2020.

To coincide with this, we at TigerFleet thought that it would be a good opportunity to give an overview of some of the steps that you can take as an individual or small business to protect yourselves from cyber attacks.

To better protect yourself from cyber criminals and secure your accounts and devices, the ACSC recommends that you:

Secure your email, social media and apps

Put strong security on important accounts where you exchange personal or sensitive information such as email, bank and social media accounts.
  • Turn on two-factor authentication, such as a code sent to your mobile, for an extra layer of security.
  • Use strong passwords on your accounts. A strong password is a passphrase of at least 13 characters, made up of about four words that are meaningful for you but not easy for others to guess. For example, ‘horsecupstarshoe’.
  • Don’t use the same password on any of your accounts.
  • Consider using a reputable password manager.

Hint: Use a Passphrase

A passphrase is similar to a password. It is used to verify access to a computer system, program or service. Passphrases are most effective when they are:

  • Used with multi-factor authentication – see below
  • Unique – not a famous phrase or lyric, and not re-used
  • Longer – phrases are generally longer than words
  • Complex – naturally occurring in a sentence with uppercase, symbols and punctuation
  • Easy to remember – saves you being locked out.

Passphrases will significantly increase security. The table below (from www.cyber.gov.au) gives some comparison on the ease of password styles to crack:

 

PASSWORD/ PASSPHRASE TIME TO CRACK EASE TO REMEMBER COMMENTS
(Brute Force Attack)
password123 Instantly Very Easy (too easy) One of the most commonly used passwords on the planet.
Spaghetti95! 24-48 hours Easy Some complexity in the most common areas, and very short length. Easy to remember, but easy to crack
5paghetti!95 24-48 hours Somewhat Easy Not much more complexity than above with character substitution, and still short length. Easy to remember, but easy to crack.
A&d8J+1! 2.5 hours Very Difficult Mildly complex, but shorter than the above passwords. Hard to remember, easy to crack.
I don’t like pineapple on my pizza! More than 1 Year  Easy Excellent character length (35 characters). Complexity is naturally high given the apostrophe, exclamation mark and use of spaces. Very easy to remember, and very difficult to crack.

Watch out for scam messages

Online scams and ‘phishing’ by email, SMS, social media posts and direct messaging are designed to steal your logins, credentials and personal details or to download malicious software onto your devices.

  • Check before you click links – hover over the link to see the actual web address.
  • Never enter your username or password from links in messages to your accounts – go to the official website or app.
  • If a message seems suspicious, contact the person/business through a separate, legitimate source to confirm it.

Secure your mobile and computer

  • Always use a PIN or password on your mobile and computer.
  • Always do the software updates such as Microsoft, iOS and Android.
  • Make sure you download apps from official stores such as the Apple App Store or Google Play for Android.
  • Install security software on your devices to protect you from malicious software.

Check public Wi-Fi before connecting

Information shared through public Wi-Fi hotspots in cafés, airports, hotels and other public places can be intercepted.

  • Turn off automatic connection to public Wi-Fi on your devices.
  • Choose to connect to non-public Wi-Fi for a more secure connection.
  • Consider installing a reputable Virtual Private Network (VPN) solution on your device.

Software Considerations Key areas

Securely organising your software can drastically increase your business’ protection from the most common types of cyber threats.

For example, your operating system is the most important piece of software on your computer. It manages your computer’s hardware and all its programs, and therefore needs to be updated, backed up and maintained.

Improve resilience, stay up to date and stay safe with these software considerations for small businesses.

Automatic Updates

An automatic update is a default or ‘set and forget’ system that updates your software as soon as one is available.

  • Better online security
  • Improved protection (in real-time, directly by the experts) from loss of money, data and identity
  • Enhanced features and efficiencies for programs and apps.

Automatic Backups

An automatic backup is a default or ‘set and forget’ system that backs up your data automatically, without human intervention.

  • Quicker and easier to get your business back up and running if information is lost, stolen or destroyed
  • Protects credibility of your business and help meets legal obligations ^
  • Peace of mind that you’re always protected so you can focus your business efforts that deliver value

Multi-Factor Authentication

Multi-factor authentication (MFA) typically requires a combination of something the user knows (pin, secret question), physically possesses (card, token) or inherently possesses (finger print, retina).

The multiple layers make it much harder for criminals to attack your business. Criminals might manage to steal one proof of identity e.g. PIN, but they still need to obtain and use the other proofs of identity. Two-factor authentication (2FA) is the most common type of MFA.

Small businesses should implement MFA wherever possible. Some MFA options include, but are not limited to:

  • Physical token
  • Random pin
  • Biometrics/ fingerprint
  • Authenticator app
  • Email
  • SMS

People and Procedures Key areas

Businesses, no matter how small, need to be aware of and consciously apply cyber security measures at every level.

Given small businesses often lack the resources for dedicated IT staff, this section addresses how you can manage who can access, and who can control your business’ information, and the training of your staff.

Your internal processes and your workforce are the last, and one of the most important lines of defence in protecting your business from cyber security threats.

Access Control

Access control is a way to limit access to a computing system. It allows business owners to:

  • Decide who they would like to give access privileges to
  • Determine which roles require what access
  • Enforce staff access control limits.

Access control systems help you protect your business by allowing you to limit staff and supplier access to your computer:

  • Networks
  • Files
  • Applications
  • Sensitive data

Peace of Mind (Part 3) – Why TigerFleet?

TigerFleet is a leading fleet management and compliance tool, with over 20 years of consultative development between industry experts and a range of transport companies. Our software platform has evolved to become a market leader, and it continues to grow and develop due to its associations with other specialist fleet hardware and software providers. 

Stencil of hi-vis vest on ground with the word Future? written in it

Our Background

The software concept was first conceived by Bob (Robert) Moyle in the late 1990s. Sadly, Bob is no longer with us but the software that he was so passionate about has grown to become his legacy to the transport industry, an industry that Bob worked in as an operator and trainer in for much of his life.

When it was first designed back in 2000, the software was called FleetMaster and, as all software was back then, it needed to be installed on either a company server or a personal computer, with the database kept locally. In 2010 Bob realised that the software world was changing and FleetMaster was redesigned and rebuilt for the cloud environment. The reprogramming and testing took around four years and the result was TigerFleet Management, the powerful program that we have today.

Peter Rowland has been involved with the company since its first year, initially as a designer, tester and consultant, and as the company’s senior manager since 2016. Peter has worked in the transport industry in many roles since 1984. He has fond memories of FleetMaster and can personally attest as to just how far the software has come.

In 2019, we relocated to the incredible serviced offices at the University of Wollongong Innovation Campus, to better enable us to service our client’s needs and

Our Products

TigerFleet Management

This is our flagship product. TigerFleet Management is a powerful fleet, employee, contractor and compliance saas platform. It has been trusted by enterprises, companies, sole traders and auditors to demonstrate compliance with national accreditation schemes and regulations. It has all of the tools you need to ensure you meet the requirements of one or multiple schemes, satisfy audit criteria, demonstrate compliance or regulatory guidelines. TigerFleet Management has a proven track record, with 20 years of industry development, and gives you the power you need to succeed every day.

 

TigerFleet Tracking

TigerFleet Tracking has fleet tracking, telematics and driver activity solution with a wide range of options for tracking and monitoring your assets and cargo.

Modern day logistics requires a lot of information for business optimization. In addition to GPS tracking, CANBUS trackers allow you to monitor your vehicle’s engine management system.

Advanced driver monitoring allows you to reduce operational costs, increase safety and comply with your legal requirements.

OBD-II and Engine Management (EM) Port ‘Plug & Play’ trackers can help reduce installation expenses and establish liability with real time tracking, warnings when a theft attempt or crash is detected, trace accidents & get fault reports.

BlueLink is the ideal Electronic Logging Device (ELD) to be used with smartphones or broadband tablets, for fleets looking for ELD compliance with basic fleet management. BlueLink plugs into the vehicle’s ECM port (J1939, J1708 or OBDII port), automatically detects and switches between them and sends via BLE to any ELD App the engine diagnostics data required for Fatigue Management compliance including: Odometer, Engine Hours, Engine ON / OFF. BlueLink ELD also sends additional engine data such as: fuel level, fuel consumption and major engine diagnostic codes. Simply Plugs into Your Vehicle’s ECM and Detects and Auto-Switches Between J1939, J1708, OBDII Protocols

Other products include solar-powered and battery-powered tracking units for trailers, and an RF Tag with built in temperature sensor, specifically designed for refrigerated trailers and containers.

We also have a number of smaller Bluetooth tags and sensors, all have long-life lithium batteries (up to 15 yrs), some have temperature or movement sensors, while others are slimline for pockets and bags or can be attached onto a staff members keyring or uniform. Compact, versatile and water-resistant, these RF and Bluetooth tags/beacons are ideal for tracking anything, including shipments (slip inside a box of valuables or a toolbox), hand trolleys, generators, pressure washers, signs, laptops, PCs and shipping containers. With transmission ranges of up to 500 metres these are simply placed on any asset to be monitored, they are easy to deploy and highly scalable, no IT required.

Combined

TigerFleet Tracking exports data to TigerFleet Management to help you better manage your fleet and real time alerts for approaching tasks. The most logical place to start was with the odometer readings, as the maintenance tasks of most vehicles is based on distances travelled. Vehicles fitted with a TigerFleet Tracking unit reports its odometer reading to TigerFleet Management once a day, every day, so your maintenance staff know exactly how close that vehicle is to its next service.

We are working on other integrations, including engine management fault reports, fuel levels and driver hours to name just a few.

While the two software packages are powerful stand-alone systems, when combined they are a one stop, integrated solution for any company that operates a fleet of vehicles, locally or around the globe.

Our Partners

Gyrus Solutions

The engine room behind the TigerFleet Management platform and API integration is Gyrus Solutions. Gyrus Solutions is a software development team based in Kiev, Ukraine. Founded in 2003, the team has over 15 years of experience in delivering full-cycle application development services to their clients worldwide. Their core activities include Azure cloud; Android applications development; Web-based B2B and B2C solutions; Specialized client-server ERP and data processing systems; Legacy Systems and application re-engineering; Database design, consulting & optimisation; Project recovery and rescue. They provide expertise and software development with industry-wide IT technologies: Core – Windows Azure, C#, ASP.NET MVC, Java (Android), DBMS – Microsoft SQL Server, Azure SQL.

Gyrus Solutions has worked closely with TigerFleet for over five years, consistently delivering the highest standard of service. Without them, TigerFleet would not be the success it is today.

Teltonika

Teltonika have been creating the internet of things (IoT) for over 20 years now and want their products and solutions to be used globally and to become indispensable in any business. Their team of professionals is the key to our partnership with them and the quality of service that we can offer our clients. TigerFleet Tracking uses a wide range of Teltonika vehicle tracking products, each dedicated for professional applications. They constantly upgrade their existing products and launch new ones to meet expectations of their customers. Teltonika also supplies TigerFleet Tracking with a range of accessories which are fully compatible with Teltonika Vehicle Telematics products, which enormously expands devices use cases and create a huge added value for your solutions.

Wireless Links

In 2019 TigerFleet Tracking was delighted to add the powerful Wireless Links suite of devices to its platform. With this association, TigerFleet Tracking can now offer Driving Hours Logging, CANBUS plug and play solutions and Driver Vehicle Inspection Reports as part of your existing Telematics solution or as a new, state of the art solution for your business. TigerFleet will also be working on an accredited Electronic Work Diary (EWD) solution with Wireless Links. All Telematics, Vehicle Inspection and Driving Hours data will be fully integrated with the TigerFleet Management platform to further strengthen our position the market and provide our clients with the most affordable, secure and reliable solution possible.

Nexus One

Nexus One was formed to meet the growing needs of the modern IT landscape. They are an Australian, Sydney based company, with a global reach. Their talented staff possess great enthusiasm when it comes to internet technologies, they welcome fresh ideas and try to build culture that allows them to thrive. Nexus One hosts the mainstay of their infrastructure in the Equinix SY3 data-centre. It provides their customers with the benefits of hosting within an N+1 rated data-centre, which has the state of the art facilities, including Redundant Power, Cooling and Climate Control, Fire Supression and 24/7 Security. They also offer services in the Equinix +ME1 data-centre in Melbourne which has the same N+1 rating for customers that need a higher level of redundancy.

Nexus One provide TigerFleet with Web Hosting, VoIP, Connectivity Solutions and some Hosted Services. Nexus One look after us, so we can look after you.

Our Promise

TigerFleet has risen to its current level by listening to its customers and designing the solutions they need. We are constantly researching opportunities to deliver a better, more cost-effective and increasingly seamless software solution.

TigerFleet strives to provide its customers with the best software platform, with automated or a single data entry point, which then communicates with other leading operational, compliance and financial products.

TigerFleet will POWER its customers into the future with a software solution that continues to be outstanding value for money, reliable and of the highest quality.

We believe every business or user is unique and must be treated as an individual, yet most of the challenges of managing a fleet are very common. This application has been developed using industry best practices in terms of technology selection and feature ease of use which has been provided by industry experts.

At TigerFleet we encompass the latest technology to tackle the rapidly evolving user requirements, thus making the day-to-day tasks more automated and less time consuming. Using our system means you don’t have to concern yourself about updates and installs, your platform will simply scale as your needs grow.

With an understanding of how you manage your vehicles, equipment and employees, we can demonstrate significant administrative and operational cost saving benefits. All we need to do is cover a few key questions so that we can identify the correct solution.

TigerFleet values fairness and diversity within the workplace, and empowers its employees by showing respect for ideas and creativity, providing the training and tools for their development and engaging in meaningful consultation.

Trial TigerFleet for 14 days to experience the true POWER of a complete vehicle, staff and contractor management solution.

Notes Screen Searchable

Did you know that the notes you make in the TigerFleet Management Vehicle’s and Employee’s Notes screens are now searchable? 
 
We thought that this would be a great place to store all of the information that just doesn’t have anywhere else to be entered, but you would still like to be able to find easily. 

Just to get your ideas rolling, we think that notes would be the ideal place to store the past registration details of a vehicle or the Serial No./Asset Code of a piece of equipment given to an employee. Instead of looking through all of the screens, you can now search the details up straight in the main Vehicles or Employees screen quickly and easily.