Author: Andrew Forrest

Do you trust your System Admins?

In today’s digital world, system administrators or IT admins play a critical role in managing and securing the digital assets and overall IT infrastructure of a business.

Continue Reading

What is the difference between antivirus and anti-malware?

The threat of malware infection continues to rise.  Businesses and individuals are increasingly seeking digital security solutions with threat detection and mitigation capabilities.

Continue Reading

Four Reasons to Host A Remote Cyber Tabletop Exercise

You may think after reading the word “tabletop” that this exercise is likely to involve activity in close physical proximity…

Continue Reading

7 Ways Investing in Cybersecurity and IT Can Improve Your Business

Cybersecurity or IT security remains a challenge for businesses of all sizes and types operating in various industries globally.

Continue Reading

Have you got a cyber security incident response plan yet?

According to the 2020 CrowdStrike Global Security Attitude Survey, Australia is a prime hotspot for targeted attacks. In the survey, 67 per cent of the Australian respondents said they had suffered at least one ransomware attack in…

Continue Reading

Data loss prevention policies

Businesses can better protect their data from hackers and strengthen their information protection infrastructure when adopting a data loss prevention (DLP) policy. When DLP is implemented correctly, it prevents third-party…

Continue Reading

Why Zero Trust strategies remain a hot topic

During the start of the COVID-19 pandemic, many organisations switched from physical workplaces to virtual offices due to commuting restrictions. But enabling workers to collaborate remotely introduced some unexpected…

Continue Reading

How to kill the password

The password remains the weakest link in any security structure. It has already been responsible for some of the most devastating security breaches around the world. Today, it is difficult to find a platform, shop, program, or device….

Continue Reading

5 simple steps to attain baseline security

Baselining systems provides your business with a point of reference and allow you to recognise when something is out of place on a critical system. A baseline can be either static (configuration-based) or dynamic (activity-based) and can be used to alert…

Continue Reading
Scroll to top