What is Phishing

What is Phishing? From packet sniffing to malware, there are many different methods that hackers employ to get access to sensitive information, but sometimes the simplest methods are the most effective. Phishing is a hacking method that’s been used since the 1990s to extract usernames, passwords, and other sensitive information from users. It’s a relatively..

Read more

What is a Data Breach

What is a Data Breach? As technology continues to advance, businesses both large and small are collecting data from their customers in exponentially increasing volumes. “Big Data” is the term used to describe the vast amounts of data that is being collected by organisations today, which might amount to as much as several exabytes (an exabyte..

Read more

GA Systems Elevated to Gold Partner Status with Netskope, leader in Cloud Security

Australian specialist security & managed provider GA Systems is now a Gold Partner with Netskope, adding the highest ranked CASB vendor its leading Managed Security Service GA Systems service deliver fully managed security operations, round the clock incident response and strategic advisory consulting, all powered by the industry’s leading advanced security tools and technologies. Gordon..

Read more

GA Systems Rises to Gold Partner Status with Rapid7

Australian specialist security & managed provider GA Systems is now a Gold Partner with Rapid7, adding the suite of technologies to its leading Managed Security Service GA Systems service deliver fully managed security operations, round the clock incident response, strategic advisory consulting, design and deploy services, all powered by the industry’s leading advanced security tools..

Read more

GA Systems Wins Yarra Trams Multi-Year Security Operations Service Contract

Yarra Trams selects Australian specialist security & managed provider GA Systems for Managed Security Service contract Yarra Trams awarded the significant multi-year contract naming the GA Systems (Global Asset Systems) as its preferred supplier after the exhaustive evaluation of multiple submissions. As a core element of the Yarra Trams Security Program, the contracts will see..

Read more

Security is critical, but in Australia & New Zealand spending is low

Once upon a time, data breaches and cyber security breaches were the concerns of a company’s IT department alone. However, cybercrime is now one of the most talked-about topics in the business world across Australia and New Zealand, even if only a third of businesses are properly prepared for cyber attacks. Although spending on security..

Read more

Cyber security attacks continue unabated

Cyber security attacks and intrusions are on the rise all across Australia and New Zealand, according to leading reports. Although businesses across the Asia Pacific region are aware of the risks and the importance of cyber security and intrusion prevention, many companies are still failing to adequately protect their business infrastructure and data from breaches…

Read more

What is Australian Data Sovereignty

Australian data sovereignty, or data residency, is a concept that is still often misunderstood by businesses, managers, and the general public alike. However, it’s important for businesses to understand how their data is stored, who owns it, and how it moves–particularly now that cloud-based data applications are increasingly popular. Below, we look at what data..

Read more

The Benefits of Using Managed Security Solutions

Why You Need Managed Security Services Cyber crime is one of the most significant threats to business and commercial operations across the globe. Not only is the rate of cyber crime incidents spiking, but attacks are becoming increasingly more sophisticated. Gone are the days when viruses and malware were easy to spot–there’s a whole range..

Read more