Security Alert: Surging Attacks on Business Email Accounts
Email is the lifeblood of modern business communication. But with its indispensability comes a critical responsibility: ensuring your email systems are secure. One of the most pressing threats today is Business Email Compromise (BEC). Falling victim to BEC doesn’t just jeopardize data—it can come with a hefty financial loss. What is a BEC Attack? BEC […]
Beware this malware: It “annoys” you into handing over login details
How Secure is Your Team Online? Think you’ve got online security nailed? You know the basics – avoiding phishing scams, dodgy downloads, and steering clear of suspicious links. But there’s a new breed of malware designed to trick even the most cautious. It’s a sneaky player in the online threat world, and its goal? To […]
A third of all data loss is caused by problems with backups
Losing access to your business’s data – even temporarily – can feel like a nightmare straight out of a horror movie. Data backup tools are designed to create copies of your data and store them securely. When things go wrong, recovery tools use these copies to restore your lost files. So, if your business already […]
Recent Cyber Incidents and Data Breaches in Australia: A Call for Vigilant Cybersecurity
In the past few months, a series of cyber incidents and data breaches have rocked organisations across various industries in Australia, highlighting the ever-growing threat of cyber-attacks. From major corporations to government agencies and small businesses, no entity seems immune to the risks posed by cybercriminals. Here’s a snapshot of some notable incidents: These incidents […]
Don’t sleep on this simple, effective security booster
Microsoft has just revealed that multi factor authentication (aka MFA) will soon be mandatory for all Azure logins to enhance security measures. Whether you’re an user yourself isn’t the point here. This news is worth noting for everyone. Utilising MFA is a powerful method to safeguard your online resources effectively. Multi factor authentication is akin, […]
Cyber extortion: What is it and what’s the risk to your business?
Cyber extortion has been a topic lately keeping many people up at night and grabbing headlines. Have you thought about it? You should as it could impact your business in the future. So what is cyber extortion? It’s a form of cybercrime where criminals threaten to harm your business by breaching its data and digital […]
Recent Cyber Incidents and Data Breaches: An Urgent Call for Enhanced Cybersecurity
In the ever-evolving digital landscape, cybersecurity remains a paramount concern for businesses of all sizes. Recent months have seen a surge in high-profile cyber incidents, highlighting the critical need for robust security measures. At Perigon One, we are committed to keeping you informed and helping you safeguard your digital assets. Here’s an overview of recent […]
Is that Chrome extension filled with malware?
If you utilise Google Chrome for your business chances are you’re no stranger to browser extensions. These handy tools can improve your experience in various ways like blocking pesky ads and minimising distractions. Extensions are widely popular for their ability to expand browser functionality. However just as you exercise caution when downloading apps on your […]
Introducing the Next Level of Cybersecurity: Perigon One’s Enhanced Standard Device Bundle
We are excited to announce the next evolution in cybersecurity for your business. As the digital landscape evolves at a rapid pace, traditional antivirus solutions are no longer adequate to protect against emerging cyber threats. At Perigon One, we have integrated an advanced cybersecurity suite into our standard device bundle, featuring Endpoint Detection and Response […]
Are your employees reporting security issues fast enough… or even at all?
Encouraging your team to report security issues is crucial for your business although it may not have been a top priority until now. While you might believe that having security tools in place ensures protection the reality is that your employees play a vital role as the initial line of defense. Their ability to identify […]