9 February 2021
If your business operates from the cloud, you will likely not have a server on premises. This means your laptop, PC's, tablets and/or personal devices become the front-line interface to the internet and core business applications.
To ensure optimal productivity and security, it is recommended businesses adapt a 'fleet management' regime, including:
Managing the age of hardware by replacing devices based on a planned lifecycle
Implement a managed se...
18 January 2021
A Vulnerability Scan is a relatively simple way to test your IT systems risk to scams, theft or sabotage. It's an application that, when applied correctly and with the right advice, is an extremely efficient and effective strategy for SMB's.
With the cloud becoming the norm, your user-interface and other systems and devices become your frontline cyber-security guards by default. Therefore, it is now more imperative than ever to ensure you are 'sure and secure'.
A Vulnera...
8 December 2020
One of the Essential Eight in Business Cyber Security
Multi-Factor Authentication (MFA) is typically described as a bulletproof solution to remote access security.
It is an effective way to add an additional security 'gate' to deter unwanted access to remote databases or sensitive information. Many of you may already have seen some version of MFA when you log into your bank account or when you re-log into your email account (such as Office 365) - once you have logged in with you...
21 October 2020
Governments and authorities in Australia are escalating their focus on cyber-security, including introducing more guidance, advice and mandatory reportable incidents.
If your organisation is covered by the Privacy Act 1988, then the NDB (Notifiable Data Breach) scheme applies. In simple terms, any suspected or known cyber attack must be notified to affected individuals and the OAIC (Office of the Australian Information Commission).
The real aim though is to mitigate the risk of cyber at...
19 August 2020
Before we talk specifically about the The Australian Cyber Security Centre's (ACSC) recommended Essential Eight-cyber security mitigation strategy; let's put the situation in perspective.
Reports are continuing to reveal facts and stats on cyber security that are increasingly alarming for small and medium sized businesses (SMB's). There are more incidents and more dollars being lost than ever before. Let me take you through a few points.
Recently, The Australian Cyber Securi...
11 May 2020
Have you been a victim of phishing?
Do you know how to recognise a phishing email?
Now that so many of us are working from home and other locations, the threat is becoming more prevalent with over 7,000 phishing scams reported in 2020 so far.
Phishing is the simplest and most common method of computer-based social engineering. A phishing attack involves crafting an email that appears legitimate but in fact contains links to fake websites or to download malicious content...
&geometry(115x98))



