
Being Cyber smart is not only for your own safety, it’s for the safety of our organisation. We are living in an age where we are constantly bombarded with SMS messages, emails, and growing our online presence through social media. We don’t always think about how the simple actions we take on these platforms can impact the safety of our workplace.

Lucky for us, we have a whole security team who are constantly monitoring the cyber threats to our organisation, but they can’t do this alone. It needs each one of us to remain vigilant!

Before you act, think! Does it seem suspicious? It’s safer to just reach out to the team and let them know, before it goes too far. You can submit a Security Violation ticket on the #TeamPossible Support Hub, and the team can investigate for you. It is ALWAYS better to be safe than sorry.
Cyber Awareness hot đ„ topics!
Cyber security | Posters and resources for sites
Our ICT security team has created a set of handy posters to help everyone stay cyber aware.
These posters are perfect for displaying around your site as daily reminders to protect yourself, our organisation and people we support from cyber threats.
Download the posters, hang them up, and help create a safer workplace:
Insider Threats | Cyber Awareness – December 2024
Keeping Endeavour Foundation safe from cyber threats is everyoneâs responsibility. One important aspect of cybersecurity is understanding insider threats; a security risk that happens when someone within our organisation, either intentionally or accidentally, causes an incident that threatens our systems.
What’s an insider threat?
An insider threat is when someone with authorised access, like employees, contractors, or vendors, misuses or mishandles information, equipment or systems. This could include accidentally sending sensitive files to the wrong person, clicking on a phishing link, or using personal devices for work without proper security measures.
How you can help prevent insider threats
- Verify emails and links: double-check before clicking suspicious links or attachments.
- Secure your passwords and use multi factor authentication (MFA): strong passwords and multi-factor authentication add layers of protection.
- Separate work and personal devices: avoid using personal devices for work-related tasks.
- Use official channels: stick to work-approved platforms for sharing information.
Read the email about insider threats.
Scams | Cyber Awareness – January 2025
It’s important that we keep Endeavour Foundation safe from cyber threats. One important aspect of cybersecurity is understanding scams; which are becoming more sophisticated, and cybercriminals are constantly finding new ways to trick us.
What is a scam?
Scams can happen to anyone. Cybercriminals often use fake emails, calls, or texts to steal sensitive information or gain access to our systems. But with the right knowledge, we can protect ourselves and the company.
Common scams to watch out for
- Phishing: fake emails that steal your login credentials or personal information.
- Vishing (Voice Phishing): calls pretending to be from trusted institutions.
- Smishing (SMS Phishing): texts with suspicious links.
- Business Email Compromise (BEC): scams targeting businesses for money or data.
- Tech Support Scams: fake calls about issues with your computer.
How you can help prevent scams
- Here are some simple steps we can all take to help prevent a scam from happening:
- Think before you click to avoid clicking on suspicious links or attachments.
- Verify requests and double-check suspicious requests directly with the source.
- Report Suspicious Activity to the ICT Security team if you think youâve received a scam message or if youâre unsure about something.
Read the email about scams. You can also visit the ScamWatch Australian Government website for more information.
Social engineering and the use of social media | Cyber Awareness – February 2025
What is social engineering?
Social engineering involves tricking individuals into disclosing confidential information or performing actions that benefit cybercriminals. These attacks can occur via email, phone calls, or social media.
Cybercriminals often gather personal details from social media to create more convincing attacks, so it’s important to be cautious about what you share online.
To help protect yourself and our organisation, here are some best practices to follow:
- Limit social media exposure and be mindful of what you share.
- Enable Multi-Factor Authentication (MFA) and secure your accounts where possible.
- Verify communication by always confirming requests through official channels.
- Stay updated and be aware of new tactics and share any suspicious activity with our ICT Security team.
Be on the lookout for the following red flags that could indicate a social engineering attempt:
- Unsolicited requests: unknown individuals asking for information.
- Urgent messages: beware of pressure to act quickly, especially when contacted by someone claiming to be from a trusted organisation.
- Unusual language: strange wording, unexpected attachments, or links.
- Too much personal info: requests for irrelevant personal details.
- Mismatched profiles: verify email addresses and social media profiles.
Read the email about social engineering. You can also visit the Secure your social media | Cyber.gov.au website for more information.
Clear Desk Policy | Cyber Awareness – March 2025
What is a Clear Desk Policy?
A clear desk policy is a set of guidelines and procedures that we have implemented to ensure employees maintain a clutter-free and secure workspace, particularly at the end of each workday, to prevent unauthorised access to confidential information
Our Physical Security Standards Policy includes information about our Clear Desk Policy in section 7.
Here’s why a Clear Desk Policy matters:
- Protects sensitive info – no more confidential documents left for wandering eyes.
- Keeps us compliant – the international information security standard (ISO 27001) requires us to safeguard physical and digital data.
- Prevents accidental exposure – a ticky note with your password is a hackerâs dream.
Quick tips to keep it secure:
- Lock away confidential documents and files
- Store laptops, USBs, and other devices securely
- Clear your desk before leaving for the day
- Shred sensitive documents when no longer needed
- NEVER write down passwords or sensitive details on sticky notes
By following these simple steps, youâre helping to protect our data, maintain compliance, and keep Endeavour Foundation secure.
Read the email about our Clear Desk Policy or download the Clear Desk Policy poster.
Safe WiFi | Cyber Awareness – April 2025
While ICT ensures workplace WiFi is kept secure, it is also important we follow safe practices when connecting to WiFi networks outside of work.
Imagine you’re at your favourite coffee shop, sipping on a latte â, and browsing the internet. Sounds relaxing, right? But did you know that public WiFi can be a playground for cybercriminals?
Hereâs how to keep your online activities safe while enjoying your coffee:
đ€« Avoid Sensitive Transactions: Public WiFi is convenient, but it’s not secure. Avoid accessing sensitive information like bank accounts or entering passwords on public networks.
đ» Use a VPN: A Virtual Private Network (VPN) encrypts your internet connection, making it harder for hackers to intercept your data. It’s like having a private tunnel for your online traffic.
đ Verify the Network: Cybercriminals often set up fake WiFi networks to trick you. Always confirm the network name with the staff before connecting.
â Turn Off Sharing: Disable file sharing and Bluetooth on your devices when using public WiFi. This prevents others from accessing your files.
â
Keep Software Updated: Ensure your devices have the latest security updates. These updates fix vulnerabilities that cybercriminals might exploit.Think of it this way: Just as you wouldnât leave your coffee unattended, donât leave your online security to chance. Stay vigilant and protect your data, no matter where you are.
Think of it this way: Just as you wouldnât leave your coffee unattended, donât leave your online security to chance. Stay vigilant and protect your data, no matter where you are.
Tailgating and physical security | Cyber Awareness – June 2025
As part of our continued commitment to cybersecurity, itâs important to remember that security doesnât start at the keyboard – it starts at the door.
Physical security is a critical layer of protection that helps prevent unauthorised access to our systems, data, and facilities. One of the most common and easily overlooked threats is tailgating – when someone without proper ID follows an authorised person into a secure area.
Why it matters
Tailgating can lead to:
- Unauthorised access to sensitive data or equipment
- Theft or tampering with physical assets
- Security breaches that may impact clients and business operation.
It can happen at:
- Main office/site entrance (swipe card reader enabled doors)
- Loading/delivery docks
- Secure car park boom gate
What you can do
đŻ Be aware – Always be mindful of who is entering behind you.
đȘ Donât hold the door –Â Even if it feels polite, donât hold secure doors open for others unless they show valid ID.
đ Report suspicious behaviour -If you notice someone attempting to enter without proper ID or acting unusually, notify ICT Security or the site supervisor immediately.
đ Secure your workplace –Â Lock your computer when away and store sensitive documents securely.
đȘȘ Always wear your ID card –Â Displaying your ID at a visible level helps everyone distinguish you and an unauthorised person.