Managed Security articles
Why Access Management Is Critical For Cybersecurity
It's easy to forget how connected we are both at home and at work. As you leave your car in the station car park and jump on the 7.04 a.m. train to Parliament, you'll likely have already used a handful of cloud-based apps to start your working day - anything from Google Suite to Slack. With the rapid pace of change across digital workplaces, the risk of cyber threats continues to escalate. Poor cybersecurity hygiene ...
Secure Your Business with Cybersecurity Awareness Month
Australians held their breath last month, captivated by the Matildas advancing to the semi-finals at the World Cup. We all watched in awe as their strong defence showed how structured routines are essential for success. Likewise, cybersecurity requires robust defence to protect your digital assets. As you know, defenders block the opponent's advances, intercept passes, and secure the team's territory. In cybersecurity, firewalls, encryption, and intrusion detection systems act as the defensive line, intercepting and ...
What is Essential 8?
What is Essential 8? The inception of the Essential 8 aimed to foster robust security and operational protocols among Australian government bodies, departments, local councils, and other entities operating in the public domain. Many private enterprises consider the Essential Eight an advantageous starting point for evaluating security measures and establishing a fundamental groundwork for cybersecurity. The custodianship of the Essential Eight is under the Australian Cyber Security Centre (ACSC) purview. What are the eight mitigation ...
Embrace Threat Modeling for Cybersecurity
Did you know Australians report a cybercrime every 7 minutes? The surging increase in cyberattacks appears to dominate each news cycle. If you feel like it never stops, new data from the Australian Cyber Security Centre (ACSC), the Australian Signals Directorate cyber spy agency branch coordinating our response to cybercrime, supports your view. In the most recent reporting period, ACSC received more than 76,000 crime reports. And there only the cybercrimes Aussies chose to report. ...
81% Surge in Business Email Compromise: Expert Insights
Imagine you've stepped out for your morning coffee. After a frantic morning of back-to-back meetings, you're in a hurry, so you duck quickly into the café across the street. But, as you go to tap your smartphone to pay, it pings. Another email from your boss. It's marked urgent. Swiping away the notification, you're curious. He is out of town at a conference. As you idly wait, you decide to open the email. Your boss ...
Survive the Unexpected: Small Business Guide
Living in a cosmopolitan city like Melbourne, getting complacent is easy. We have had a challenging few years during the pandemic but living in Melbourne, or Australia more broadly, we are a lucky country. That's not to say we don't have our issues and are not immune from threats ranging from natural disasters to cyberattacks. As you know, Melbourne has experienced two earthquakes in the last few weeks. Fortunately, they have not caused widespread damage ...
3 Proven Ways to Avoid Data Breach Costs
You've undoubtedly found yourself in a fire drill when working in a tall office building in Docklands or along Lonsdale Street. You understand how it feels when you hear the first beep, beep, followed by the whoop, whoop. So you know, by working on the 19th floor... it will be a long way down the emergency stairs to the marshalling point. But here's the thing, practising an evacuation saves lives, and all employees should participate, ...
Is it safe for me to use an open Wi-Fi hotspot?
A client sent me an email from Dubai International Airport. He was very proud of himself as he had worked out how to get onto the Wi-Fi without any support. He even sent me a screenshot of the Wi-Fi connection he was on. I could see straight away it was an open connection, and he was at risk of exposing his data to others on the same Wi-Fi. A quick phone call and we had ...
What’s Lurking in Your Home and Putting Your Identity at Risk?
There has been much discussion recently about Melbourne's local councils introducing changes to rubbish bin collections, including the introduction of a new bin for glass. So, many households will now have four bins to sort and put out each week. Depending on where you live, some councils have floated only a fortnightly collection for garbage (aka. the 'red bin'). But for all the talk of sorting, recycling and doing your bit to reduce landfill, no ...
5 Steps For Effective Vulnerability Management
As I sat down to write these tips to manage security vulnerabilities, my smartphone flashed a news notification that criminals had carried out another cyberattack on an Australian company. A financial institution, no less...Latitude Financial. Cyberattacks on major Australian companies dominated headlines in late 2022. But, consider how cybercriminals attacked large organisations like Medibank Private and Optus. With the resources they have to manage their IT securely, how were they still exposed? What does this ...