This October is Cyber Security Awareness Month, an annual reminder for all Australians to stay secure online. Each year, the Australian Signals Directorate chooses a theme, this year is ‘Be cyber wise – don’t compromise’ to underscore the crucial role of cyber security fundamentals...
7 ways to optimise cyber insurance with good cyber security
It has become difficult to avoid the headlines and conversations about cyber attacks impacting businesses lately. You might be tired of hearing how sophisticated cyber attacks are increasing in prevalence, but this is more than a scaremongering tactic. Across the 2021-22 financial year, the...
Why take a risk-based approach to cyber security?
Threats such as phishing, malware, and ransomware continue to increase in sophistication, posing significant business risks. These not only disrupt business operations and compromise sensitive data, but they also have tangible financial and reputational impacts. For example, Medibank’s shares fell by 18% following their...
Why your business needs managed detection and response
How quickly could your business detect and respond to a cyber attack? Think about that for a moment. Perhaps you do feel like the response would be quick. You might have a robust incident response plan or simply have started working with a cybersecurity...
Antivirus software protection is no longer enough
In this digital age, people are constantly online, and the cyber security landscape is ever evolving. We’re using more devices, apps, and services than ever before, which means there are also more ways for cybercriminals to get into our systems. Antivirus software is no longer...
An introduction to Managed Detection and Response
Businesses of all sizes and industries need to be prepared for any situation. 58% of Australian businesses experienced up to five IT security incidents in the last in the last year, with 37% of those incidents most likely concerning compromised endpoints. With the chance...
What is zero trust, and does your business need it?
Today’s interconnected world means that threats can come from anywhere – even from within your own network. As more users log into professional accounts from their personal devices, the risk of sensitive data being exposed grows as well.This is where zero trust comes in:...
5 endpoint security best practices for employees
Employees who access company data on a regular basis are in a privileged position. They are privy to business data and can potentially misuse it accidentally or for their own ends. Cyber threats are extremely commonplace and the potential of an attack or data...
Disaster recovery solutions and the cloud
It’s no secret that disasters can strike at any time. Whether it’s a hurricane, earthquake, or cyberattack, natural disasters and other forms of crisis can have an especially devastating impact on businesses.Fortunately, there are ways to prepare for the unplanned—even if you operate a...
The 2022 cybersecurity landscape
The last two years have changed the way we use technology forever, and those changes have had a profound impact on the cybersecurity landscape. The challenges of recent times will not be the same as the ones we face in the future.Let’s take a...