Blog

Business man working on a laptop conducting a email security & phishing threat assessment Business man working on a laptop conducting a email security & phishing threat assessment

Protecting Your Email with Email Security & Phishing Threat Assessment

30 April 2019

Email is a crucial business and communication medium in the digital world. The majority of our communications (including confidential communications) are carried out over email. Email is also the favorite mode of initial attack or entry point for most cyber criminal activities. Phishing, whaling, and malware campaigns are the most common examples w…

Read More
A hand under a shield representing ASD Essential 8 security controls A hand under a shield representing ASD Essential 8 security controls

Which Essential controls should be at the top of your list?

15 March 2019

Plenty of good guidance is available to help improve an organisation’s information security. In Australia and New Zealand organisations such as the Australian Signals Directorate (ASD) and Cert NZ publish very useful lists, to help us prioritise which controls to implement, based on the threat and incident data that is available to them.

Read More
Close up of a keyboard with the words cyber security on a key Close up of a keyboard with the words cyber security on a key

Cybersecurity continues to be a hot topic in 2019

31 January 2019

2019 is off to a very hot start. In case you missed them, some of the notable IT security items that hit the news in December and January included - A massive data breach exposed the private data of 500,000 guests of the Marriott International hotel chain and a high percentage of this data included passport and credit card numbers.

Read More
A hacker working behind 3 monitors infiltrating and organisations IT environment A hacker working behind 3 monitors infiltrating and organisations IT environment

2.5 Months passed before attackers were stopped

02 November 2018

Data security is a major concern for organisations of any size, type and industry. There are endless examples of small to major data breaches being reported in the media, often very little detail is made available regarding attack vectors, investigative work performed, findings etc. In the last two months a U.S agency called the Government Accounta…

Read More

Contact Us Today

Fill in the form below or call us on +61 3 9913 3248 (VIC), +61 7 3194 3664 (QLD) or +61 2 9098 8206 (NSW)