By 2021, cybercrime will cost the world $6 trillion annually—and the most common threats are internal attacks from malicious insiders. IT is now responsible for managing a larger attack surface than ever, thanks to end users relying on personal devices for work, and accessing cloud apps and corporate resources from remote locations. How can you
read moreThe new workplace is becoming virtual, with the majority of the Australian workforce now working remotely, either full or part-time. For many of us, remote work requires quick adjustments in how we connect with our team and stay productive and engaged. We’re sharing some of the best practices we’ve recommended to our employees to staying
read moreMoving at short notice from a trusted office environment to working remotely can create security risks. On top of this, nasty opportunist crooks are already using the coronavirus as subject matter for their phishing scams, hoping that the unwary will click through and hand over passwords or other data. We share our best tips to
read moreBusiness continuity management is the process of identifying risks to your organisation and exploring solutions. Proper business continuity planning involves creating a set of priorities and first steps in response to any incident. It also requires understanding what’s feasible and achievable after an event. This means business continuity management must be mindful of budgets, resources,
read moreSecurity analytics is an approach to digital security that analyzes data to detect anomalies, unusual user behavior, and other threats. It aggregates data from across the entire ecosystem and turns that data into actionable insights — so that IT can quickly act to minimize risks. Advanced features like artificial intelligence (AI) and machine learning (ML)
read moreFinally Making Password Security a Thing of the Past! It’s Not About the Password; It’s What’s Behind It. In the nexus of IT infrastructure security, passwords are no longer an effective security mechanism. While it’s easy to blame our employees for creating these risk factors with poor password-management techniques such as creating weak passwords or
read more