Blog

A team of the CEO, IT managers, and IT administrators working together to build a secure IT environment A team of the CEO, IT managers, and IT administrators working together to build a secure IT environment

Having Confidence in Cyber Security

03 July 2019

As an organisation goes through a technology transformation and increasingly adopts the use of the cloud it will work with new and existing suppliers to design and build systems. In doing so security ideally should be built or baked in to minimise the impact of a security incident in the future.

Read More

BlueKeep Vulnerability - Patch, Don’t Delay

05 June 2019

There is increasing concern that many organisations still have not applied a patch that fixes a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability known as BlueKeep, or more formally called CVE-2019-0708, can be applied to any internet facing systems running Windows XP or Windows 7, and Windows server versions 2003 and 2008.

Read More
A satellite view of stars and a section of the Earth highlighting Australia, symbolising the remote areas where Kaon delivers IT and cybersecurity service A satellite view of stars and a section of the Earth highlighting Australia, symbolising the remote areas where Kaon delivers IT and cybersecurity service

IT Security For Organisations In Remote Locations

16 May 2019

Kaon Security are a trusted IT security partner for a large number of local government and commercial entities across the ANZ region. Using our remote location consulting service offerings means you can tap into the same high calibre professional security expertise that larger organisations get ready access to in main centres.

Read More
Business man working on a laptop conducting a email security & phishing threat assessment Business man working on a laptop conducting a email security & phishing threat assessment

Protecting Your Email with Email Security & Phishing Threat Assessment

30 April 2019

Email is a crucial business and communication medium in the digital world. The majority of our communications (including confidential communications) are carried out over email. Email is also the favorite mode of initial attack or entry point for most cyber criminal activities. Phishing, whaling, and malware campaigns are the most common examples w…

Read More

Contact Us Today

Fill in the form below or call us on +61 3 9913 3248 (VIC), +61 7 3194 3664 (QLD) or +61 2 9098 8206 (NSW)