TAG

CYBER SECURITY

Vulnerability Scanning vs Penetration Testing

7 MARCH 2023 - 2 MINS READ

Vulnerability scanning versus penetration testing: what's the difference and which is better? Read all about it in our latest cyber security blog.

Why disaster prevention is easier than disaster recovery

2 DECEMBER 2022 - 4 MINS READ

In a research conducted by Infrascale, it revealed that 21% of SMBs do not have data back up or disaster recovery (DR) solution in place....

Lessons learned from the largest Australian data breach

18 OCTOBER 2022 - 4 MINS READ

What can we learn from the recent largest security breach in Australia? We provide tips in this blog so you won't become the next cybersecurity statistic.

How can you minimise the repercussions of a ransomware attack?

26 APRIL 2022 - 2 MINS READ

A blog from one of our Microsoft Dynamics GP consultants.In the last two months, I have worked with two Dynamics GP clients who suffered ransomware...

What has the Log4j security vulnerability taught us?

25 JANUARY 2022 - 5 MINS READ

Log4j: as it relates both outside and inside of the Infor SunSystems realm.You know an identified security vulnerability is a real concern when it’s not...

Top 10 Security Deployment Actions with Microsoft 365

10 AUGUST 2021 - 2 MINS READ

Are you a Microsoft 365 subscriber? Do you know that you can enable secure remote working with Microsoft 365? Take the actions below to strengthen...

5 ways your employees put your business at risk

13 JULY 2021 - 7 MINS READ

The majority of security breaches we have heard of recently were triggered by unpredictable behaviour of any organisation’s greatest asset – their Employees. Whilst the...

SharePoint security mistakes to avoid and how to lock it down

25 SEPTEMBER 2018 - 7 MINS READ

There is no denying that there have been many organisations that embraced Office 365 as their collaboration and productivity platform of choice. More than 28...

How Office 365 security helps with your compliance obligations

18 SEPTEMBER 2018 - 7 MINS READ

Compliance is one of the major concerns for most businesses we speak to and with the ever changing IT landscape, it is becoming increasingly hard...

Application Whitelisting: Why is it essential for every business?

18 JULY 2018 - 6 MINS READ

During our recent June Security event, we talked about Australian Signal Directorate’s Essential Eight Strategies, as a recommended baseline to address risks associated with cybersecurity....

Talk to us

If you would like to learn more, complete the form below and one of our team will be in contact.

Your information will never be shared or sold to a 3rd party,
please read our privacy policy.