September 2020

Top 6 Cybersecurity Best Practices for Every Remote Employee

2020-09-21T09:52:40+10:00Security|

Top 6 Cybersecurity Best Practices for Every Remote Employee Remote employees have gone from the exception to the rule for businesses in Sydney and around the world. The COVID-19 pandemic forced the issue during the global lockdowns, and many companies are finding work-from-home (WFH) works for them and their employees.

August 2020

7 Important Ways Your Business Can Prevent a Security Data Breach

2020-08-10T10:51:26+10:00Security|

7 Important Ways Your Business Can Prevent a Security Data Breach Company technology infrastructures are intricate and include information being shared from multiple endpoints, devices, cloud applications, and on-premise hardware.

Comments Off on 7 Important Ways Your Business Can Prevent a Security Data Breach

July 2020

How to Create an Effective Employee Cybersecurity Awareness Training Plan

2020-07-27T09:42:59+10:00Security, Technology|

How to Create an Effective Employee Cybersecurity Awareness Training Plan While companies will typically put a lot of thought and resources behind the hardware and software used for business IT security, the human element of cybersecurity can get less attention.

Comments Off on How to Create an Effective Employee Cybersecurity Awareness Training Plan

What are the Top Mobile Threats Our Company Should Prepare For?

2020-07-20T10:02:32+10:00Mobile Device Management, Security|

What are the Top Mobile Threats Our Company Should Prepare For? Mobile devices represent a unique threat when it comes to your corporate IT security. Rather than staying in one place, they travel and can connect to any number of different Wi-Fi networks (public and private) each week.

Comments Off on What are the Top Mobile Threats Our Company Should Prepare For?

June 2020

What is Email Spoofing? How to Spot a Compromised Email

2020-06-22T09:20:39+10:00Security|

What is Email Spoofing? How to Spot a Compromised Email One of the first places that users look when they receive an email is the “From” line of the message. This lets users know how to prioritise incoming email and also whether an unexpected email is from someone they know.

Comments Off on What is Email Spoofing? How to Spot a Compromised Email

May 2020

Can We Improve Our Network Performance with Wireless Access Points?

2020-05-18T08:31:15+10:00Security, Technology|

Can We Improve Our Network Performance with Wireless Access Points? Our dependence on Wi-Fi has only continued to grow. Twenty years ago, an office might have just a handful of computers that needed to connect to their wireless network. But today, companies have multiple IoT devices, mobile devices, wireless printers,

Comments Off on Can We Improve Our Network Performance with Wireless Access Points?

Gain Visibility Over Cloud Infrastructure with Microsoft Cloud App Security

2020-05-11T09:33:11+10:00Backup & Disaster Recovery, Microsoft 365, Security|

Gain Visibility Over Cloud Infrastructure with Microsoft Cloud App Security Business adoption of cloud services is just about universal now. A large majority of companies of all sizes have transitioned over the last decade to using web and cloud app-based applications giving them the ability to access their data from

Comments Off on Gain Visibility Over Cloud Infrastructure with Microsoft Cloud App Security

April 2020

6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams

2020-04-22T11:25:37+10:00Security|

6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams Phishing is a danger all the time, but especially so during time of uncertainty and stress. It’s often when people’s minds are elsewhere that they get caught with their defences down and fall for a phishing scam.

Comments Off on 6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams
Go to Top