Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Roger Smith

SME's Virtual Chief Information Security Officer (CISO) at Care MIT

Canberra, Australia

Roger Smith is renowned for his engaging and insightful approach to cybersecurity, blending humour with a deep understanding of digital threats to increase awareness and understanding across various audiences. With a career spanning over five decades, Roger has dedicated himself to enhancing the digital security landscape for individuals, small to medium enterprises (SMEs), and not-for-profit organisations.

As the founder and CEO of Care MIT, Roger's expertise lies in devising and implementing robust personal, digital, and business security solutions. His approach is holistic and proactive, focusing on transforming entities into more secure and resilient establishments. Drawing inspiration from Sun Tzu's ancient wisdom, Roger believes in a strategic understanding of cyber adversaries to protect against becoming easy targets in the digital realm.

Roger's commitment to cybersecurity education is evident in his role as an instructor at the Australian Defence Force Academy, where he imparts critical cybersecurity knowledge to undergraduate students. Through hands-on experience, his course reveals the workings and potential dangers posed by cybercriminals, equipping future leaders with the skills to combat digital threats.

With a distinguished career that began in the Australian Navy in 1982, Roger has become a leading figure in business security, especially within the Canberra region. His literary contributions, including the Amazon number one bestseller "Cybercrime, a clear and present danger," alongside various international publications and co-authored works, underscore his expertise and influence in the field.
Roger's dedication to cybersecurity education was recognized when he was awarded the prestigious Cybersecurity Educator of the Year award in 2017, highlighting his significant impact on raising awareness and educating about digital threats.

Currently, Roger is channelling his extensive knowledge and experience into his next book, "Sitting Duck to Moving Target." This forthcoming work aims to guide SMEs through the necessary processes to withstand cyber incidents with minimal business disruption, leveraging the NIST framework to foster a secure and resilient business environment.

Roger Smith continues to be a pivotal figure in the cybersecurity domain, combining extensive field experience with a passion for education to empower individuals and organisations against the ever-evolving landscape of digital threats.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Canberra
Speaking Topics: Cybersecurity for SMEs and Nonprofits, Business security of SMEs and Nonprofits, Education of Retirees, awareness, culture

Speaking Fee $1,980 (In-Person)

Roger Smith Points
Academic 0
Author 582
Influencer 175
Speaker 14
Entrepreneur 110
Total 881

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Business security
Theatre: Australia/asia
Minimum Project Size: <$1,000
Average Hourly Rate: $150-$199
Number of Employees: 1-10
Company Founded Date: 2018
Media Experience: 9
Last Media Training: 05/25/2018
Last Media Interview: 02/23/2022

Areas of Expertise

AI 30.01
AR/VR
Big Data 30.06
Business Continuity 33.38
Business Strategy 33.77
Cloud 30.04
Culture
Cybersecurity 56.46
Digital Disruption 30.19
Digital Transformation
Diversity and Inclusion 30.11
EdTech
Education 50.82
Emerging Technology
FinTech
GovTech
Innovation
IoT 30.02
IT Leadership 33.30
IT Operations 86
IT Strategy 32.59
Leadership 30.11
Legal and IP 30.25
Management 30.23
Privacy 30.58
Risk Management 49.84
Security 52.26
Social 30.33
Startups
Supply Chain 30.03

Industry Experience

Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Manufacturing
Media
Pharmaceuticals
Professional Services
Real Estate
Retail
Telecommunications
Travel & Transportation

Publications

82 Article/Blogs
Mastering the Human Side of Cybersecurity
LinkedIn
August 01, 2024
In the realm of cyber threats, technology isn't the only target. Social engineering attacks exploit human psychology, turning people into the weakest link in security chains. For small and medium-sized enterprises (#SMEs) and #nonprofit organisations, understanding these attacks is crucial for building robust defences.

See publication

Tags: Cybersecurity, Risk Management, Security

In the Digital Age – Your Adversary = CYBERCRIMINALS!
FinTech Bloom
May 04, 2024
When “Cybercrime – A Clear and Present Danger” hit the shelves in 2014, it painted a stark picture of the digital threats looming on the horizon. The book forecasted a surge in cyber attacks, pinpointing how these would become more sophisticated and damaging. Today, this prediction has unfolded with alarming accuracy. Attacks have not only escalated in frequency but have grown in complexity, targeting businesses of all sizes, including yours.

See publication

Tags: Cybersecurity, IT Strategy, Security

A Generic Guide to Recovering and Fortifying Hacked Phones and Compromised Accounts
LinkedIn
March 27, 2024
Addressing a situation where your phone has been hacked, your phone number ported, and your email account compromised involves a multi-step process for recovery and securing your accounts to prevent future incidents.

See publication

Tags: Cybersecurity, Risk Management, Security

Fight Cyber Risk with a vCISO
Website
February 14, 2024
For CEOs and board members, understanding and confronting cyber risks is critical for business resilience and growth.

See publication

Tags: Cybersecurity, Risk Management, Security

Cyber Risks, A Liability Too Great for Organizations to Ignore
Simple cybersecurity tips!
January 11, 2024
In an era where data breaches and cyberattacks are not anomalies but expected occurrences, addressing digital risk is no longer optional for organizations.
It's a pressing necessity. CEOs and board members, often not experts in cyber and digital realms, face a daunting reality, unaddressed risk is a direct path to liability.

See publication

Tags: Cybersecurity, Risk Management, Security

The Human Factor: Why Social Engineering Outsmarts Advanced Cybersecurity Technology
LinkedIn
March 20, 2023
In today's digitally connected world, the importance of cybersecurity has grown tremendously as businesses invest heavily in advanced technology to protect their valuable assets from cyber-attacks.

See publication

Tags: Cybersecurity, Privacy, Security

Cybersecurity for Non-Profits and Associations: Protecting Your Future
Simple cybersecurity tips!
February 24, 2023
Cybersecurity is essential for any organization, but non-profits and associations face unique challenges when it comes to protecting themselves against cyber threats. These organizations operate on limited budgets, often with limited IT resources, and handle sensitive information that is attractive to cyber criminals. That's why it's critical for non-profits and associations to take proactive steps to protect their valuable data and intellectual property, reduce the risk of a successful attack, and safeguard their reputation.

See publication

Tags: Cybersecurity, Privacy, Security

Building cyber resilience into a business is essential in today's increasingly digital world.
Simple cybersecurity tips!
January 02, 2023
With the increasing reliance on technology, businesses are exposed to a wide range of cyber threats, from data breaches and ransomware attacks to phishing scams and network intrusions.

See publication

Tags: Cybersecurity, Security

Securing office 365 - 2 FA, security defaults, train your users, separate admin accounts,
Simple cybersecurity tips!
September 14, 2022
If you are using Office365 for a business there are a number of security protocols and business requirements that can be implemented to ensure that you are not a victim of Business Email Compromise (BEC).
You need to avoid a BEC for the simple fact that if the bad guys gain access to your email portal they can do irreparable damage to your business.

See publication

Tags: Cybersecurity, Security

Breach plan, website security and monitoring administrators
LinkedIn
August 31, 2022
Have you done everything to stop the bad guys from gaining access to your stuff.

See publication

Tags: Cybersecurity, Leadership, Security

Technology budgets, security in depth and banners!
Simple cybersecurity tips!
August 17, 2022
Budgets for business can be an issue.
When it comes to technology, 5-year-old computers, printers, operating systems, routers, monitoring systems, switches and mobile devices are just asking to be breached.

See publication

Tags: Cybersecurity, Security

Data encryption, Google alerts and why you need to manage administrator access
Simple cybersecurity tips!
August 03, 2022
When everything else fails and you have implemented data encryption there is still a chance that the information that is stolen in its encryption state is unreadable by the theif.

See publication

Tags: Cybersecurity, Security

Social engineering - what tha???, avoiding the scams, and let's get rid of those default passwords
LinkedIn
July 20, 2022
Social engineering is the process used by the cyber criminal to get you to make a mistake.

See publication

Tags: Cybersecurity, Security

Passwords same/same/different, backing up the right way and understanding social media
LinkedIn
July 06, 2022
Password, aren't they a problem.

See publication

Tags: Cybersecurity, Security

Three more tips to secure your business!
Linked In
June 08, 2022

See publication

Tags: Cybersecurity, Business Continuity, Security

Why you need passwords, test your BC and DR plan and secure your WiFi!
LinkedIn
May 26, 2022
Are you using complex, unique passwords with more than 10 characters to access your systems and there are no shared accounts?

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

What happens when you get infected with malware!
Linked In
May 24, 2022
I am often rebuked with comments like “we are too small to be a target” or “we have nothing worth stealing”

So I thought I would look at a small scenario!

To set the scene - Let’s take a micro-business making $200k per year

See publication

Tags: Cybersecurity, Business Continuity, Security

Three quick tips to build security in your organisation!
Linked In
May 12, 2022
If you are concerned why not complete our 30-question audit (https:\\action.scoreapp.com). It will give you great insight into areas where you may be lacking in your security.

See publication

Tags: Cybersecurity, Business Continuity, Security

Putting 3 more cybersecurity myths to bed!
Linked In
April 29, 2022
Not the normal ones here are 3 more myths that need to be debunked

See publication

Tags: Cybersecurity, Risk Management, Security

Cybersecurity - why don't we do it the right way?
Linked In
April 21, 2022
The excuses are quite astounding

See publication

Tags: Cybersecurity, Risk Management, Security

IOT devices, no time for security.
Linked In
October 10, 2021
Leaving the house, locking the doors, setting the alarm - we make time to be secure
In the internet of things (#IOT) space, security is often an afterthought..
DIY code platforms, make the proliferation of IOT devices easy.

See publication

Tags: Cybersecurity, IoT, Risk Management

An open letter to retirees and the elderly
Linked In
September 29, 2021
The problem with today's digital devices is that we (yes me included) have been forced into their use.
If we want government services we have to use a device or get some help to work out what we need to do.
If we want to stay in contact with family and friends then we need some type of digital device.
To spend, move or borrow money we need some type of digital device to access websites and accounts.
Government departments post everything on their website so you need a device to see it.

See publication

Tags: Cybersecurity, Risk Management, Diversity and Inclusion

Cybersecurity, why CEOs and Boards have it wrong
Website
September 20, 2021
When it comes to digital and business security, board members and C level executives still have it wrong.
Business security is not an IT issue although there are some IT components!
Business security is not a compliance issue but there are compliance requirements!
Business security is all about protecting your assets but before you can protect them you have to identify them

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

Cybersecurity for the C suite executive
Website
September 20, 2021
Let's look at the facts!
No matter the size, shape or industry of an organisation.
No one is fully prepared for a full-on, bare-knuckle, cyber ninja assault.
We are not talking about a random attack.
An attack that is being perpetrated against your organisation with Metasploit and a new copy of Kali.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

How do we convince the management of any organisation that cybersecurity is the key?
Website
September 20, 2021
“The irony is that a strong cybersecurity posture is one of the greatest business-enabling tools an organization can have in its arsenal.” Robert Herjavec
There is an area in business where the c suite and board members have limited understanding but require a huge focus
An area where getting it wrong could be the end.
That area is the cyber and digital space.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

30 Author Newsletters
The Importance of Cybersecurity Policies
LinkedIn
September 29, 2024
In an age where digital threats loom large, having a robust cybersecurity policy is no longer optional—it's essential. A well-crafted cybersecurity policy sets the foundation for protecting your organisation’s data, assets, and reputation. Here’s how to draft an effective cybersecurity policy that safeguards your business

See publication

Tags: Cybersecurity, Risk Management, Security

Stay Ahead of Hackers - The Critical Need for Regular Software Updates
LinkedIn
September 05, 2024
Keeping your software updated is not just a technical chore—it is a critical step in protecting your business from cyber threats. For small and medium-sized enterprises (SMEs) and nonprofit organisations, regular software updates are essential to maintaining a secure and resilient IT environment.

See publication

Tags: Cybersecurity, Risk Management, Security

What is the risk?
LinkedIn
August 22, 2024
In today’s digital age, cyber threats are an ever-present danger for businesses of all sizes. As these threats become more sophisticated, the need for robust risk management strategies becomes critical. Cyber insurance has emerged as a vital tool in this landscape, offering financial protection and peace of mind. Here’s why CEOs should consider cyber insurance as an essential part of their risk management plan

See publication

Tags: Cybersecurity, Risk Management, Security

Ensuring Business Continuity and Cyber Resilience
LinkedIn
August 15, 2024
In today’s digital landscape, cyber resilience is essential for every organisation. For small and medium-sized enterprises (SMEs) and nonprofits, developing a cyber resilient business is crucial to withstand and recover from cyber threats. Here’s how to build a cyber resilient organisation.

See publication

Tags: Cybersecurity, Risk Management, Security

Ensuring Your Business's Digital Health
LinkedIn
July 19, 2024
In today's digital age, regular cybersecurity audits are essential for safeguarding sensitive information and maintaining operational continuity. For small and medium-sized enterprises (#SMEs) and #nonprofit organisations, these audits provide a critical layer of defence against evolving cyber threats.

See publication

Tags: Cybersecurity, Risk Management, Security

Firewalls
Linkedln
July 11, 2024
In the ever-evolving landscape of cybersecurity, firewalls remain a fundamental tool in protecting networks from malicious attacks. Serving as the first line of defence, firewalls are crucial for organisations of all sizes, especially for small and medium enterprises (SMEs) and nonprofit organisations with limited resources.

See publication

Tags: Cybersecurity, Risk Management, Security

Responding Right!
LinkedIn
July 04, 2024
In today's digital age, the ability to respond swiftly and effectively to cyber incidents is crucial. For small and medium-sized enterprises (SMEs) and nonprofit organisations, having a robust incident response plan can make the difference between a minor disruption and a catastrophic event. Here's how to craft an effective incident response plan that protects your business from cyber threats.

See publication

Tags: Cybersecurity, Risk Management, Security

Training Your Workforce in Cybersecurity Awareness
LinkedIn
June 27, 2024
Cybersecurity is not just an IT issue; it's a fundamental aspect of every business's operations. In today's digital age, training your staff in cybersecurity awareness is crucial to protecting your organization from cyber threats. Empowering your team with the right knowledge and skills can significantly reduce the risk of a breach. Here’s how to effectively train your staff in cybersecurity awareness.

See publication

Tags: Cybersecurity, Risk Management, Security

Fortifying Finances
LinkedIn
June 20, 2024
In an era where digital transactions have become commonplace, ensuring the security of online payments is paramount. For small and medium-sized enterprises (SMEs) and nonprofit organizations, safeguarding online transactions is not just a technical necessity but a critical business practice.

See publication

Tags: Cybersecurity, Risk Management, Security

Essential Internet Security Practices for Safe Browsing and Executive Leadership
LinkedIn
June 13, 2024
The internet is a powerful tool for business and personal use, but it is also rife with potential dangers. As cyber threats become more sophisticated, it's essential to adopt safe browsing practices to protect your data and privacy. Here are some practical tips to help you navigate the web securely.

See publication

Tags: Cybersecurity, Risk Management, Security

Crafting Policies to Protect Your Business
LinkedIn
June 06, 2024
In an increasingly digital world, the importance of a robust cybersecurity policy cannot be overstated. For small and medium-sized enterprises (SMEs) and nonprofit organizations, crafting a comprehensive cybersecurity policy is a critical step towards safeguarding sensitive information and ensuring operational continuity. Here’s a guide to developing a cybersecurity policy that protects your business from emerging threats.

See publication

Tags: Cybersecurity, Risk Management, Security

Responding to a Cybersecurity Breach
Linkedln
May 30, 2024
A cybersecurity breach can be a nightmare for any organisation. When an attack occurs, swift and decisive action is crucial to minimize damage. Here's a step-by-step guide on what to do immediately after discovering a breach, tailored for managers, owners, C-suite executives, and board members of SMEs and nonprofit organisations.

See publication

Tags: Cybersecurity, Risk Management, Security

Navigating Cybersecurity in the Era of Remote Work
LinkedIn
May 23, 2024
The shift to remote work has transformed the business landscape, presenting new opportunities and significant challenges. For small and medium-sized enterprises (SMEs) and nonprofit organisations, the rapid adoption of remote work has brought cybersecurity to the forefront of business concerns.

See publication

Tags: Cybersecurity, Risk Management, Security

How secure is your "Cloud"?
LinkedIn
May 16, 2024
In the digital age, cloud computing has revolutionized how organisations store, access, and share information. As more businesses migrate to the cloud to enhance collaboration and operational efficiency, understanding how to secure cloud environments is vital. This article explores effective strategies for protecting your data within the cloud, crucial for SMEs and nonprofit organisations where resources may be limited, but the need for security is paramount.

See publication

Tags: Cybersecurity, Risk Management, Security

The Critical Role of Cyber Insurance in Business
LinkedIn
May 09, 2024
In today's digital landscape, where cyber threats loom large, cyber insurance emerges as a vital shield for businesses. It is not merely an optional safeguard but an essential component of modern business strategy, particularly for small and medium-sized enterprises (SMEs) and nonprofits. Understanding the fundamentals of cyber insurance can help these organizations protect against potentially devastating financial losses.

See publication

Tags: Cybersecurity, Risk Management, Security

Ensuring Mobile Security On the Move
Linkedln
April 25, 2024
In today's digital era, mobile devices have become our primary connection to the world, storing everything from personal photos to sensitive business data. However, this convenience comes with increased security risks. Cyber threats targeting mobile devices are on the rise, making robust mobile security not just advisable, but essential.

See publication

Tags: Cybersecurity, Risk Management, Security

The Cybersecurity Checkup
LinkedIn
April 11, 2024
In the digital age, the health of your organization's cybersecurity is as crucial as its financial stability. Regular cybersecurity audits act as comprehensive checkups, identifying vulnerabilities and ensuring your defenses align with the ever-evolving threat landscape. These audits offer a panoramic view of your cybersecurity posture, highlighting areas of strength and pinpointing weaknesses that could become gateways for cybercriminals.

See publication

Tags: Cybersecurity, Risk Management, Security

Mastering Security in the Digital Sky (Oh look it's in the cloud)
LinkedIn
April 04, 2024
In the vast expanse of the digital sky, cloud computing has emerged as a beacon of innovation and efficiency for businesses worldwide. Yet, as organisations soar higher into this cloud, the imperative of securing their digital assets becomes paramount. Cloud security, an essential yet often complex facet of digital strategy, demands a nuanced approach tailored to the unique needs and vulnerabilities of each enterprise.

See publication

Tags: Cybersecurity, Risk Management, Security

A Blueprint for Cyber Resilience
Linkedln
March 21, 2024
In the digital age, a cybersecurity breach is not a matter of if, but when. For leaders at the helm of SMEs and nonprofits, the immediate aftermath of a breach is a critical juncture, demanding swift, decisive action. The first step is to contain the breach. Like a captain plugging a leak in their ship, isolate affected systems to prevent further damage. Next, assess the breach's scope—understand what's at stake. This is your map in uncharted waters.

See publication

Tags: Cybersecurity, Risk Management, Security

The Pocket-Sized Battleground
LinkedIn
March 14, 2024
In the age of ubiquitous connectivity, our mobile devices are not just tools of convenience, they are the gateways to our professional lives, holding the keys to vast troves of corporate data.

See publication

Tags: Cybersecurity, Risk Management, Security

Navigating the Murky Waters of Deception
LinkedIn
March 07, 2024
These cunningly crafted deceptions masquerade as trustworthy entities, baiting unsuspecting users with the lure of urgency or familiarity, only to ensnare personal information or financial details.

See publication

Tags: Cybersecurity, Risk Management, Security

The Imperative of Data Encryption
LinkedIn
February 29, 2024
In the digital dominion, where data traverses the globe in the blink of an eye, encryption stands as the silent guardian of information.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

One of the Keystone of Cybersecurity - Mastering Password Fortification
LinkedIn
February 22, 2024
In the digital fortress of personal and organizational security, passwords stand as the first line of defense.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Safe Web Browsing Habits
LinkedIn
February 15, 2024
Navigating the vast expanse of the internet requires more than just a click, it demands vigilance.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Secure Use of Email and Communication Tools
LinkedIn
February 08, 2024
As the backbone of professional and personal exchanges, emails carry within them the lifeblood of modern communication—sensitive information, confidential plans, and private correspondences

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

7 Books
Beyond I.T.
KDP
August 14, 2024
Transforming business with managed services

See publication

Tags: Cybersecurity, Education, IT Operations

Securing Your Digital Life After Domestic Violence
KDP
May 10, 2024
This essential guide empowers survivors of domestic violence with vital tools and knowledge to secure their digital lives, helping them navigate online spaces safely, maintain privacy, and reclaim control in the aftermath of abuse.

See publication

Tags: Cybersecurity, Education, Security

The Essential Cyber Safety Guide for Retirees
KDP
April 08, 2024
As retirees increasingly turn to the internet for social connections, banking, shopping, and more, the imperative for robust cyber safety measures has never been more acute. "The Essential Cyber Safety Guide for Retirees" serves not just as a manual but as a beacon, guiding users through the digital fog with clarity and confidence.

See publication

Tags: Cybersecurity, Education, Security

A Strategic Guide to Cybersecurity for SMEs and Nonprofits
Amazon KDP
March 03, 2024
Navigate the digital landscape with confidence, leveraging cybersecurity as a strategic asset to propel your business.

See publication

Tags: Cybersecurity, Risk Management, Security

How do you handle the "insider" threat?
LinkedIn
July 14, 2018
The internal “spy” - the insider threat, The hardest attack to defend against in cybersecurity. There are three types of spy

See publication

Tags: Cybersecurity

CyberCrime - A Clear and Present Danger The CEO's Guide to Cyber Security
Lulu
July 01, 2014
Every business has something it needs to protect. Whether it’s top-secret IP, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren’t doing a very good job of protecting what’s theirs.
The digital world is changing fast—and cybercrime is changing with it. Whether it’s a 12-year-old “script kiddie” crippling your website with denial-of-service attacks, or a master hacker targeting a project leader with phishing e-mails, the bad guys have dozens of clever and creative ways to take your assets.

See publication

Tags: Cybersecurity

The Basics of Business Information Security
Lulu
July 01, 2011
How normal people can understand the complexity of cybersecurity.

See publication

Tags: Cybersecurity

3 eBooks
Beyond IT
KDP
August 14, 2024
Transforming business with managed services

See publication

Tags: Cybersecurity, IT Strategy, Security

The accountants guide to cyber resilience
Website
March 20, 2024
In an era where the digital frontier expands with every passing moment, you, the guardians of financial integrity for SMEs and nonprofits, find yourselves at a crossroads. The advent of the internet has not only revolutionized how you conduct business but also ushered in an array of cyber threats, shadowing every keystroke and transaction with potential peril.

See publication

Tags: Cybersecurity, Risk Management, Security

The Legal Industry's Guide to Cybersecurity
website
March 24, 2023
Cybersecurity is increasingly becoming a critical business functon for organisations in all sectors and
industries, including the legal industry.
As legal firms continue to adopt new technologies and embrace digital transformation they are also facing
increasing cybersecurity challenges and risks. In Australia, legal firms are no exception to these
challenges and need to prioritise cybersecurity to protect their sensitive data and intellectual property.
The legal industry is a high-value target for cybercriminals due to the vast amounts of sensitive data it handles, including confidential client information, financial data, and legal documentaton.

See publication

Tags: Cybersecurity, Risk Management, Security

11 Executives
A Generic Guide to Recovering and Fortifying Hacked Phones and Compromised Accounts
LinkedIn
March 28, 2024
In the digital age, our personal devices and online accounts form the backbone of our daily lives, storing a wealth of sensitive information from personal correspondence to financial details. However, this reliance on digital technology comes with its own set of vulnerabilities, making us prime targets for cybercriminals. A hacked phone, a ported phone number, or a compromised email account can feel like a personal violation, leaving one feeling exposed and uncertain about the security of their digital identity. The consequences can range from minor inconveniences to significant financial and emotional distress.

Navigating the aftermath of such cyber intrusions requires a structured and informed approach to regain control of your digital life and prevent future breaches. This guide aims to provide a comprehensive roadmap for individuals facing the daunting task of recovering from a hacked phone, ported number, and compromised email. We'll explore immediate steps to mitigate damage, strategies for securing your digital identity, and long-term practices to fortify your online presence against future threats. By understanding and implementing these measures, you can transform this challenging experience into an opportunity to build a more secure digital foundation.

See publication

Tags: Cybersecurity, IT Leadership, Security

Why are there so many cybersecurity issues
LinkedIn
March 05, 2021
There are so many cybersecurity issues out there in the digital world actually focusing on any single problem is like nailing jelly to the wall.

Each of those issues has a focus, in some cases a single focus on what the problem is, how it can be managed and what business and organisations can do to counteract the issue.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

3 philosophies we rely on to be secure!
LinkedIn
February 10, 2021
These three philosophies for business security have nothing to do with security.

Business security is many things to many people and companies

It is the driving force ensuring you are not the news on the internet.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Why good business security is all about increasing profits, productivity and resilience.
LinkedIn
December 03, 2020
There is a downside to a cyber event and I can tell you, every part is down!

Our role in business security (#cybersecurity) is not to scare the crap out of you but more to educate you in the ways of the cybercriminal.

See publication

Tags: Cybersecurity, Risk Management, Security

How do you prioritise security in business?
LinkedIn
August 31, 2020
#Businesssecurity is not simply about putting the right preventative technology and systems in place.

See publication

Tags: Risk Management, Business Strategy, Security

Stop thinking cybercrime is about YOU!
LinkedIn
June 22, 2020
Users of the digital world, especially in business have a litany of reasons why a cyber event would not happen them!

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Are you a leader for today?
LinkedIn
March 21, 2020
If you are in business, leadership is one of those intangible tangibles that makes it work.

This is March 2020, running your SME is now all about survival. There are not many organisations today, that are not in survival mode.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Office 365 is not a backup!
LinkedIn
March 01, 2020
Most businesses are using office 365 or google apps.

A cloud-based system that delivers access to software with a monthly subscription cost. What could be better for not just SME’s but for any organisation?

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Why your ICT department is overwhelmed with securing your organisation!
LinkedIn
February 03, 2020
When it comes to business security, outsourcing to a business security provider, is not, in reality, outsourcing.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Is training your staff about cyber more important than any other component in business?
LinkedIn
January 25, 2020
Any cyber event can have serious implications for your business.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Why 2020 could be a bad cybersecurity year for SME’s
LinkedIn
January 12, 2020
It is hard to predict an outcome when it comes to business security - Boy was this prediction wrong

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

1 Influencer Award
2019 Cybersecurity Educators Award
Cybersecurity Excellence Awards
February 21, 2019
The 2019 Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.
Thank you for your unique contributions to the cybersecurity industry - protecting data, workloads and systems for individuals and organizations.

See publication

Tags: Cybersecurity

3 Media Interviews
Keeping your business cyber secure
Youtube video
January 19, 2024
Discussion on the best way to secure SMEs and Nonprofits

See publication

Tags: Cybersecurity, Education, Security

The future of cyber attacks
Panther
December 05, 2021
Cyber attacks have evolved considerably in the last 12 – 18 months because of the change in business requirements. Working from home (WFH) put staff outside the protective envelope of the normal business which was one issue.

See publication

Tags: Cybersecurity, Education, Security

Thought Leader Interview with Roger Smith, CEO, R and I ICT Consulting Services
Thinkers360
June 14, 2019
Thinkers360 Interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Roger Smith, CEO, R and I ICT Consulting Services.

See publication

Tags: Cybersecurity, Privacy

1 Miscellaneous
SMEs and Nonprofits are at the crossroads of a cyber-Storm
FinTechBloom
January 30, 2024
The converging forces of heightened expectations, stringent regulations, advanced threats and multiplying vulnerabilities are brewing a perfect storm, one that these organisations are ill-equipped to weather with their current attitude and resources.

See publication

Tags: Cybersecurity, FinTech, Security

2 Podcasts
The old persons take on protecting your stuff
Buzzsprout
January 01, 2022
When it comes to retirees, the elderly and mature aged people there is a huge issue with the digital components of their lives that have been forced on them through the embracing of the internet.

See publication

Tags: Cybersecurity, Security, Social

Need help - Ask Roger
Buzzsprout
January 01, 2022
The complex world of protecting your organisation from the internet-based cybercriminal can be daunting for most.As a C-level executive, manager, owner or board member of a not-for-profit organisation, a charity or a small or medium enterprise you are faced with a number of issues related to data.This podcast is here to help you, from simple solutions to complex strategies. It will address as many as possible.Business is all about risk, revenue, brand and productivity.A cyber event can impact all of them.

See publication

Tags: Business Strategy, Cybersecurity, Security

1 Speaker Award
Cybersecurity Excellence Awards educator of the year
Cybersecurity Insiders
January 25, 2018

See publication

Tags: Cybersecurity, Leadership

3 Speaking Engagements
TOO SMALL TO BE A TARGET?
LinkedIn
August 10, 2020
Are you safe from a cyber event?

SME's have issues with #businesssecurity.

80% of SMEs consider themselves safe from a cyber event, virus attack, malware or data breach although they have not invested in anything better than AV.

You are not immune just because you believe:
It will not happen to us
We have nothing worth stealing and
We are too small to be a target.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Using the 2 person rule for security
LinkedIn
August 09, 2020
How does an internet scam work?

The most important part of any scam is making you believe, above everything else, that what they say is true.

Protecting a business from that eventuality can be achieved with a couple of very simple rules:

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Business Security Insights
LinkedIn
August 06, 2020
There is a huge difference between the skill level of an ICT team and those required to secure an organisation.

Good IT deliver the opportunities that can only come from good computer support.

We are told - "It is all about computers!"

In the last couple of years, ICT teams are required to function as a high-end security team without additional budgets, skills or training.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

1 Video
What security is around your website and social media?
YouTube
May 02, 2020
Your website is a critical component of your business.
Make sure it is as safe as possible!
Social media is the same!

See publication

Tags: Cybersecurity, Management

3 Whitepapers
Mastering Personal Digital Security after Retirement
Self
March 07, 2024
In the twilight of a fulfilling career, as you embark on the rewarding journey of retirement, the digital world offers boundless opportunities to connect, learn, and engage.

However, it also presents new challenges in the form of cybersecurity threats.

This white paper is crafted with you in mind, distilling complex digital security concepts into accessible wisdom. It aims to empower you, the esteemed retiree, with the knowledge and tools to navigate the online landscape safely and confidently.

Embrace this guide as a beacon of security in your digital endeavors, ensuring your peace of mind in this next chapter of life.

See publication

Tags: Cybersecurity, Risk Management, Security

Great ICT v's Cybersecurity
Self
July 09, 2018
The digital world is having a significant impact on society as we know it.
It's the same in business, we are adopting platforms, systems and technology faster so that we can get that edge over our competitors.
Over our rivals.
One of the largest problems is understanding what we are collecting, where it is being stored, who has access to it and who is authorised to use it.
Changes to governance and compliance, if not already, will have an increased impact on SME’s, large corporations and multinational organisations worldwide.
More and more people are getting concerned about what we, as organisations, are doing with the information we are collecting.

See publication

Tags: Cybersecurity

Roger’s Security and Compliance Guide - white paper
Self
July 01, 2015
As a small and medium Business and not for profit organisation this white paper looks at the understanding that needs to be achieved to protect your business and company data from being compromised

See publication

Tags: Cybersecurity

Thinkers360 Credentials

11 Badges

Radar

1 Prediction
2021 Predictions for Cybersecurity

Date : October 22, 2020

In addition to the long term standard protective requirements against the cybercriminal and nation states. There are 3 areas of the digital world that will cause a shift in cybersecurity requirements is 2021.

Deep Fake will become mainstream. It will also become a mainstream problem and stopping it and exposing it will be a priority for social media companies.

AI - Artificial intelligence will be heavily deployed by nation states and criminal gangs. Both have the money, expertise, and capabilities to inject AI into their attack profiles and strategies.

Ransomware will have a bigger impact on business because the transition from encrypt to copy and encrypt. The new ransom will consist of "you may have a backup but we have a copy of your data and we will dump it on the internet if you do not pay us".

See Radar

Blog

2 Article/Blogs
It's a big issue when your own people think that IT is security
Thinkers360
April 06, 2021
Convincing people that business security is a whole of business endeavor is a process that we often have to undertake. At times it can be very difficult. Invariably when Cybersecurity is mentioned the response is “oh, the IT department has that in hand”

See blog

Tags: Cybersecurity, Risk Management

When it comes to cybercrime, protecting 100 clients should be no different from protecting 1,000,000
Thinkers360
July 24, 2018
The bulk of cyber events in the news are focused on large multinational organizations and government departments. Newsworthy events are in fact always newsworthy. These are the organizations we hope and believe are focused on protecting the information that we unwittingly give them through our interaction. An attack on them makes for great copy. But, the overall problem with cyber events is not the big fish. The big fish are known to have millions of records that should be protected from a cyber-attack. Not protecting them reflects in spectacular thefts and large-scale reputation failures. Newsworthy events! Large organizations have the expertise, the finances and the understanding that they have to protect their client’s information in the best way possible. SME’s do not! How many SME’s have gone out of business after a cyber event is unknown. Some of the statistics are available, but not many are focused on whether it was poor management and cash flow or a cyber event that damaged their business to a point where it was unrecoverable. Did it put them out of business? One of the things I discovered a couple of years ago is the way the cybercriminal works. There is a large correlation between the script kiddies and the true hackers, one that is not really known, but every now and then becomes visible. The Internet is a great resource. It is a great resource for us, but it is an even greater resource for the budding cybercriminal. The Internet can put the budding script kiddy in contact with the true hacker. That contact can be very problematic for SME’s. What are my targets, after a little research - SME’s with access to trusts, intellectual property, large amounts of cash or the new one, critical infrastructure? These targets have reduced business intelligence, lack complex systems, lack digital expertise, but more importantly have a blaze attitude to security. You know the attitude well - it will not happen to me, we have nothing worth stealing or she’ll be right. Will an SME survive having its trust fund drained - probably not! Protecting our digital assets is no longer a multinational organization’s problem, it is everyone’s problem, everyone with a digital device has the problem and has to be part of the solution. http://business-security.com.au/when-it-comes-to-cybercrime-protecting-100-clients-should-be-no-different-from-protecting-1000000/

See blog

Tags: Cybersecurity

Opportunities

1 Speaker
Cybersecurity as it relates to business capability

Location: Australia    Fees: 1,500 - 10,000

Service Type: Service Offered

Protecting business from a cyber event is all a process. Understanding and implementing that process is how SME's avoid a cyber event.
Let me show you how

Respond to this opportunity

Contact Roger Smith

Book Roger Smith for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Roger Smith


Latest Activity

Latest Opportunities