Articles

Have you got a cyber security incident response plan yet?

According to the 2020 CrowdStrike Global Security Attitude Survey, Australia is a prime hotspot for targeted attacks. In the survey, 67 per cent of the Australian respondents said they had suffered at least one ransomware attack in…

Continue Reading

The benefits of having an external SOC team

With the imminence of cyber threats, building an effective security operations centre (SOC) is crucial for organisations of all sizes. Although businesses differ in their services, their commonality lies in being susceptible to growing cyber security risks….

Continue Reading

Data loss prevention policies

Businesses can better protect their data from hackers and strengthen their information protection infrastructure when adopting a data loss prevention (DLP) policy. When DLP is implemented correctly, it prevents third-party…

Continue Reading

Why Zero Trust strategies remain a hot topic

During the start of the COVID-19 pandemic, many organisations switched from physical workplaces to virtual offices due to commuting restrictions. But enabling workers to collaborate remotely introduced some unexpected…

Continue Reading

How to kill the password

The password remains the weakest link in any security structure. It has already been responsible for some of the most devastating security breaches around the world. Today, it is difficult to find a platform, shop, program, or device….

Continue Reading

5 simple steps to attain baseline security

Baselining systems provides your business with a point of reference and allow you to recognise when something is out of place on a critical system. A baseline can be either static (configuration-based) or dynamic (activity-based) and can be used to alert…

Continue Reading

What are cyber security assessments, and why are they important?

A subsequent audit is undertaken by a certified information security auditor and their team, providing you with a detailed and formal compliance snapshot. The results of an audit must be presented to your Board and may need to be declared in your annual results…

Continue Reading

What is the value of effective cyber security?

Protecting sensitive business data requires effective cybersecurity measures. Failure to implement robust cybersecurity measures will result in the loss of intellectual property, sensitive customer information, and compliance data. The situation is particularly bad in Australia where…

Continue Reading

Reasons why you should outsource your cyber security

The need for enhanced cyber security solutions continues to grow as cyber security threats increase. Securing important information has become a costly affair. As the nature and complexity of cyber attacks mutates, companies have to contend with sophisticated cyber attacks…

Continue Reading

Is my business protected against Ransomware?

Ransomware is a serious risk to businesses in Australia. In the first half of 2020, there were 33 ransomware attacks recorded in the country, up from only 13 in the second half of 2019. This is something you and your business certainly need to be aware of, but how can you be sure that you are protected against ransomware?…

Continue Reading
Scroll to top