Cyber Security

How to kill the password

The password remains the weakest link in any security structure. It has already been responsible for some of the most devastating security breaches around the world. Today, it is difficult to find a platform, shop, program, or device….

Continue Reading

5 simple steps to attain baseline security

Baselining systems provides your business with a point of reference and allow you to recognise when something is out of place on a critical system. A baseline can be either static (configuration-based) or dynamic (activity-based) and can be used to alert…

Continue Reading

What are cyber security assessments, and why are they important?

A subsequent audit is undertaken by a certified information security auditor and their team, providing you with a detailed and formal compliance snapshot. The results of an audit must be presented to your Board and may need to be declared in your annual results…

Continue Reading

What is the value of effective cyber security?

Protecting sensitive business data requires effective cybersecurity measures. Failure to implement robust cybersecurity measures will result in the loss of intellectual property, sensitive customer information, and compliance data. The situation is particularly bad in Australia where…

Continue Reading

Reasons why you should outsource your cyber security

The need for enhanced cyber security solutions continues to grow as cyber security threats increase. Securing important information has become a costly affair. As the nature and complexity of cyber attacks mutates, companies have to contend with sophisticated cyber attacks…

Continue Reading

Is my business protected against Ransomware?

Ransomware is a serious risk to businesses in Australia. In the first half of 2020, there were 33 ransomware attacks recorded in the country, up from only 13 in the second half of 2019. This is something you and your business certainly need to be aware of, but how can you be sure that you are protected against ransomware?…

Continue Reading

What is a cyber security compliance assessment?

There is no difference between a gap assessment and a compliance assessment. In both cases, the objective is to pinpoint gaps within your security controls. The identified gaps may not necessarily insinuate the existence of a tangible cyber security risk, however the compliance assessment will…

Continue Reading

How can companies improve their security maturity levels?

With more than 43 per cent of cyber all attacks aimed at small businesses, it’s essential that you develop solid security practices to protect business assets and critical data. Otherwise, you risk reputational damage, financial losses, and costly downtime. But when it comes to improving your company’s security ‘maturity’ levels…

Continue Reading

Has your DVR/NVR been breached?

Has your DVR or NVR security system experienced a breach? Without the proper software and firmware updates, and the proper managed services to monitor and assess a situation, a breach of your CCTV and security systems is a real possibility. What is to say that it is not happening right now…

Continue Reading

A guide to supply chain attacks

Cyberspace is a growing risk for many businesses – a ticking time bomb waiting to go off when it’s least expected. In the current cyber threat landscape, it’s not a matter of if you’ll get attacked but when. Hackers are always coming up with ingenious new ways to perpetrate cybercrimes, be it data theft…

Continue Reading
Scroll to top