Security awareness training

Cyber security awareness training Businesses Benefit from Security Awareness Training Cyber threats to company data and business processes are growing every day, and organisations need to be prepared to repel outside attempts at hacking, phishing and corporate espionage. Educating and training employees in corporate security practices will help protect your company from the digital attacks..

Read more

What is cybersquatting, domain squatting and how to prevent it

What is cybersquatting, domain squatting and how to prevent it What is cybersquatting? Cybersquatting refers to the act of registering or using a domain name that cashes in on another person’s (or business’s) trademark. Also known as domain squatting, cybersquatting is considered a cyber crime, with victims able to take those using their name for..

Read more

Artificial Intelligence in Cybersecurity

Artificial Intelligence in Cybersecurity The term “cybersecurity” refers to the systems that organisations put in place to counter malicious online attacks and safeguard networks against unauthorised access. In 2019 you’d be hard-pressed to find a business or organisation that doesn’t rely on computer networks to process, move or store private and potentially sensitive information. As..

Read more

What is Ransomware

What Is Ransomware Government, business, and other organisations increasingly place cybersecurity atop their list of priorities as cybercriminals and terrorists grow ever more sophisticated. Malware in all its forms can immediately cripple a system or bleed it of vital information for years. Ransomware, however, comes from purely criminal intent. Ransomware Defined Ransomware, or ransom malware,..

Read more

Best practices in Vulnerability management

Best practices in vulnerability management Data breaches continue to cost businesses and waste resources, with organisations looking for new ways to avoid threats and manage critical software systems. Vulnerability management is an important piece of the security puzzle and a mandatory process for development and security teams. Effective and efficient vulnerability management involves more than..

Read more

Security challenges for SCADA devices

Security challenges for SCADA devices Modern organisations have to deal with more security threats than ever before. The changing nature of the digital landscape continues to affect workplace security, from cloud migration and mobile devices through to online commerce and interactive web applications. Networks themselves are also changing, with elastic and highly connected network architecture..

Read more

Building cyber security responsibility with your employees

How to Build Cyber Security Responsibility with your Employees Cyber security is a priority for businesses across Australia and New Zealand, particularly since cyber attacks and intrusions are a growing problem. What’s particularly worrying about cyber integrity, however, is how often human error causes security breaches. Statistics show that employee mistakes cause the most cyber..

Read more

Best practices in Cloud Security

Best practices in Cloud Security Organisations continue to migrate to the cloud in order to enhance productivity, improve accessibility, and promote compliance standards. While the cloud is fundamentally changing how we work, communicate, and manage information, security is one of the areas holding people back. As one of the fundamental building blocks of a successful..

Read more

What is Phishing

What is Phishing? From packet sniffing to malware, there are many different methods that hackers employ to get access to sensitive information, but sometimes the simplest methods are the most effective. Phishing is a hacking method that’s been used since the 1990s to extract usernames, passwords, and other sensitive information from users. It’s a relatively..

Read more

What is a Data Breach

What is a Data Breach? As technology continues to advance, businesses both large and small are collecting data from their customers in exponentially increasing volumes. “Big Data” is the term used to describe the vast amounts of data that is being collected by organisations today, which might amount to as much as several exabytes (an exabyte..

Read more