Articles

What is a cyber security compliance assessment?

There is no difference between a gap assessment and a compliance assessment. In both cases, the objective is to pinpoint gaps within your security controls. The identified gaps may not necessarily insinuate the existence of a tangible cyber security risk, however the compliance assessment will…

Continue Reading

How can companies improve their security maturity levels?

With more than 43 per cent of cyber all attacks aimed at small businesses, it’s essential that you develop solid security practices to protect business assets and critical data. Otherwise, you risk reputational damage, financial losses, and costly downtime. But when it comes to improving your company’s security ‘maturity’ levels…

Continue Reading

Has your DVR/NVR been breached?

Has your DVR or NVR security system experienced a breach? Without the proper software and firmware updates, and the proper managed services to monitor and assess a situation, a breach of your CCTV and security systems is a real possibility. What is to say that it is not happening right now…

Continue Reading

A guide to supply chain attacks

Cyberspace is a growing risk for many businesses – a ticking time bomb waiting to go off when it’s least expected. In the current cyber threat landscape, it’s not a matter of if you’ll get attacked but when. Hackers are always coming up with ingenious new ways to perpetrate cybercrimes, be it data theft…

Continue Reading

Federated Identity Management (FIM) vs. Single Sign On (SSO)

Cyber security has become big news in recent years after a number of major breaches hit the headlines. Despite this, Australians are seriously lax when it comes to passwords. Around 90% of Australians say that they know that reusing passwords is insecure, but…

Continue Reading

Data Breaches involving MSPs

Data breaches are common among Australian businesses, with malicious attacks, human error, and system faults continuing to compromise digital records in multiple industry sectors. In order to keep track of significant breaches, the Office of the Australian Information…

Continue Reading

Notifiable Data Breach Notifications Overview (July 2020 – December 2020)

Data breaches are increasingly common among Australian businesses. Robust security solutions are needed to protect data integrity, operational compliance, and business continuity now more than ever. Security breaches are recorded and analysed each year in an effort to…

Continue Reading

How to set up a Samba Honeypot (SMB) and lure attackers

Creating traps, luring in cyber attackers, and revealing any evidence left behind – in a nutshell, is a honeypot. Think of capturing live malware to debunk and improve one self’s security posture. With this in mind, it becomes quick to realise how critical setting up a honeypot can be…

Continue Reading

How secure is your business from cyber attacks?

A few years ago, I provided an IT manager with the very first Intrusion Prevention System report they had ever encountered. This IT manager didn’t think too much of it at the time, but come 9:00 PM on Friday, he finally sat down and digested it. Shortly after we received dozens of panicked phone calls requesting urgent assistance with the tens of thousands…

Continue Reading

Preparing and responding to cyber security incidents

According to a report by the OAIC (Office of the Australian Information Commissioner), there were 518 notifiable data breach incidents in the first half of 2020. The report cites malicious criminal activities and human error as the leading causes of data breaches. Looking at those figures, not much seems to have changed over the last two years…

Continue Reading
Scroll to top