Four reasons why all businesses should embrace the ACSC Essential 8 Framework – How robust is your cybersecurity?

Cyber security has become top of mind for any business looking to adequately protect their IT infrastructure. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And if you haven’t, it […]

Read more

What are the pillars in the ACSC Essential 8 and how does your NFP stack up?

For any NFP keen to shore up their cybersecurity, the ACSC Essential 8 provides a valuable and cost-effective framework. The benefits of the framework were highlighted in our recent blog, Mitigation strategies for cyber-attacks: Essential 8 for NFPs. But what are the pillars that make up the framework and how can they help you assess […]

Read more

Mitigation strategies for cyber-attacks: Essential 8 for NFPs

As with all businesses, cyber security has become top of mind for Australian not-for-profits (NFPs) looking to adequately protect their organisation. If you are considering mitigation strategies for cyber-attacks, then it is likely you have come across the Australian cybersecurity Essential 8 framework (also known as the Australian Signals Directorate (ASD) Essential 8 controls). And […]

Read more

COVID 19 – An IT Firm’s Response

The global COVID-19 outbreak has changed our community overnight and forced a large portion of the workforce to work from home. We are seeing businesses and employees adjusting: my local HIIT gym are now providing classes online, our favourite restaurant is now doing home deliveries, and we’ve started picking up goods via drive through at […]

Read more

The 5 types of Insider Threat Facing Businesses

There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of […]

Read more

Managed Detection and Response: The new Security Strategy

Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.

Read more