Blog

A laptop on a boardroom table with a holographic of an IT security shield leading to secured IT systems from a successful cybersecurity strategy A laptop on a boardroom table with a holographic of an IT security shield leading to secured IT systems from a successful cybersecurity strategy

What's Your Strategy?

16 June 2022

Although cybersecurity risks impact every enterprise, the ways in which they are affected are different, as is the way in which they develop and deliver their Cybersecurity Strategy. Cybersecurity has few, if any, one-size-fits-all solutions. Each organisation is unique, as are its needs and goals.

Read More
An organisations secure IT systems and information assets due to a Microsoft 365 security review being conducted to check the security configuration settings An organisations secure IT systems and information assets due to a Microsoft 365 security review being conducted to check the security configuration settings

When did you last conduct a thorough Microsoft 365 Security Review?

05 May 2022

In a recent communication we outlined how Kaon Security when conducting Microsoft 365 security reviews have found many organisations have a well a configured tenancy in some areas but commonly those organisations still have some critical or high-risk security issues to address, and opportunities for improvement. Even where security best practices a…

Read More
A secure laptop, server, and IT systems due to a well tested incident response plan A secure laptop, server, and IT systems due to a well tested incident response plan

Being Prepared and Resilient

02 March 2022

Many organisations have an Incident Response Plan, but do not go to the extent of testing its effectiveness by simulating a potential security incident to pre-condition the response teams behaviour when the reality of an incident occurs.

Read More
A team of people working on PC's Identifying and categorising their third party information risks A team of people working on PC's Identifying and categorising their third party information risks

Developing Third Party Risk Management for Information Security

25 November 2021

When it comes to third party information security risk management, how do you ensure that the third parties engaged to do work for your organisation preserve the confidentiality, integrity, and availability of your information?

Read More

Contact Us Today

Fill in the form below or call us on +61 3 9913 3248 (VIC), +61 7 3194 3664 (QLD) or +61 2 9098 8206 (NSW)