5 endpoint security best practices for employees

Employees who access company data on a regular basis are in a privileged position. They are privy to business data and can potentially misuse it accidentally or for their own ends. Cyber threats are extremely commonplace and the potential of an attack or data...

The 2022 cybersecurity landscape

The last two years have changed the way we use technology forever, and those changes have had a profound impact on the cybersecurity landscape. The challenges of recent times will not be the same as the ones we face in the future.Let’s take a...

Cyber safety vs cyber security: What’s the difference?

Cyber safety and cyber security are two topics we hear a lot about in today’s world, as our dependency on internet-connected technology grows. While they’re both related and involve online safety, they have important differences.When we talk about cyber safety, we’re referring to how...

Configuring Microsoft 365 for maximum security

It is no secret that Microsoft 365 is one of the best productivity suites. You can use it on your smartphone, tablet, and on your desktop computer.However, Microsoft focuses on security when you’re configuring the Microsoft 365 suite. Its features include email encryption, data...

Apache Log4j CVE-2021-44228 Log4Shell Vulnerability

UPDATE 1: 16/12/2021 - Added new vulnerability information and update from Sophos MTR Team. On December 9 2021, a severe remote code vulnerability was revealed in Apache’s Log4J , a very common logging system used by developers of web and server applications based on...

Steps to successfully manage a data breach

What you need to do when a data breach occurs When people hear the words “data breach” they often think “cyber security attack”. But the truth is that a data breach can take place through a multitude of different ways. While the Australian government...

How malicious actors are using automation

Increasingly used within businesses across all industries, automation helps minimise human input during basic and repetitive tasks. The goal of automation is to simplify and streamline processes and tasks in your workplace. It can be used to achieve smoother workflows and increase productivity. By...

The future of cybersecurity automation

In this digital age, cyberattacks are growing more sophisticated and slyer every day. Malicious actors use new technologies to implement their offensive strategies, and you need to keep up to remain ahead of these cyberthreats.An estimated 30,000 websites are hacked every day around the...

What the ACSC cybercrime report means for your business

What the ACSC cybercrime report means for your business The numbers have been tallied and the final results are in - cybercrime is on the rise, and every business and individual should be concerned.The Australian Cyber Security Centre (ACSC) have just released their Annual...

Better Cyber Security with Application Whitelisting

Cyberattack threats are on the rise and can cause serious, long-lasting damage to your business and operations. The AV-TEST Institute has already registered over 1.2 billion malware threats this year, with the numbers climbing rapidly every day.Application whitelisting (AWL) is one of the most...