What is zero trust, and does your business need it?

Today’s interconnected world means that threats can come from anywhere – even from within your own network. As more users log into professional accounts from their personal devices, the risk of sensitive data being exposed grows as well.This is where zero trust comes in:...

5 endpoint security best practices for employees

Employees who access company data on a regular basis are in a privileged position. They are privy to business data and can potentially misuse it accidentally or for their own ends. Cyber threats are extremely commonplace and the potential of an attack or data...

Disaster recovery solutions and the cloud

It’s no secret that disasters can strike at any time. Whether it’s a hurricane, earthquake, or cyberattack, natural disasters and other forms of crisis can have an especially devastating impact on businesses.Fortunately, there are ways to prepare for the unplanned—even if you operate a...

The 2022 cybersecurity landscape

The last two years have changed the way we use technology forever, and those changes have had a profound impact on the cybersecurity landscape. The challenges of recent times will not be the same as the ones we face in the future.Let’s take a...

Disaster strikes: what should your business do?

Disaster recovery is a process that starts before and continues long after the incident; it’s not just an overnight development.Over 30% of businesses directly impacted by the 2011 Queensland floods lost over $100,000; while it is as yet unknown how badly Queensland and New...

White Alert and Advisory Announcement: Essential Eight

At any given time, cyber-attacks are a potential threat to businesses around Australia and the world. Recent developments in Ukraine have increased the possibility of a wave of cyber-attacks which has the potential to also impact NATO countries in the coming months.The Australian Cyber...

Cyber safety vs cyber security: What’s the difference?

Cyber safety and cyber security are two topics we hear a lot about in today’s world, as our dependency on internet-connected technology grows. While they’re both related and involve online safety, they have important differences.When we talk about cyber safety, we’re referring to how...

Dangers of cyberthreats and attacks in the manufacturing industry

Cyber-attacks continue to be a growing concern for every business sector, and in the last two years it has become an increasing problem for the manufacturing industry. In 2020 manufacturing was the second most targeted industry, with the average breach taking 220 days to...

What XDR, EDR, and MTR mean for your business​

In today’s rapidly changing digital arena, cybersecurity is critical to ensure your business is well protected from cyberattacks. Cyberattacks are becoming more targeted, and more sophisticated, costing businesses their reputation, disrupting operations, and in some situations being heavily fined.There are many different ways malicious...

Apache Log4j CVE-2021-44228 Log4Shell Vulnerability

UPDATE 1: 16/12/2021 - Added new vulnerability information and update from Sophos MTR Team. On December 9 2021, a severe remote code vulnerability was revealed in Apache’s Log4J , a very common logging system used by developers of web and server applications based on...