Securing Your Cloud – Part 1: Multi-Factor Authentication

The cloud may be the answer to many business problems, but it’s not without its risks. Luckily, there are solutions such as multi-factor authentication that are helping to keep the cloud more secure.  Storing critical business data in the cloud… it just makes sense, doesn’t it? When your vital information is stored virtually – and […]

The Simple Guide to Password Managers

Password managers are one of the best ways to protect data. Yet many businesses still aren’t sure about what they are, or how they work. Discover everything you need to know in our simple guide.  If you’ve been following our blog, you may remember that we recently reported on how Australians have fallen into the […]

The hidden dangers of free VPNs: Are you at risk? 

Are you aware that the rise in global VPN usage has skyrocketed? The reasons are clear as day: Virtual Private Networks offer increased security, anonymity, and allow access to geo-restricted content online.  But here’s the million-dollar question: Are all VPNs created equal? The answer is a resounding no. And that has potential implications for your […]

Most People Use the Same 3 (Weak) Passwords for Everything

How many different passwords are your employees using in the workplace? Believe it or not, they’re likely to be sharing the same three between all their accounts – and they’re incredibly easy to hack.  Hands up. How many of us are using ‘123456’ as our password?  It’s probably a lot more than you may think. […]

Could YOU Spot Spoofed WiFi?

As remote working continues to thrive, employees are logging in from anywhere and everywhere. But can you be sure they’re connecting using secure networks? Or could they fall victim to spoofed WiFi? Working remotely doesn’t just mean working from home. In fact, in a UK survey, 26% of workers said restaurants were an acceptable place […]

Are Wireless Peripherals Secure?

In the age of remote and hybrid working, wireless peripherals are one of the most practical choices any business can make. But are wireless keyboards and mice leaving you vulnerable to an attack? With more and more employees working from home – or splitting their time between home and the office – there has been […]

How to Avoid a Phishing Attack

Phishing attacks are becoming increasingly common. And while simple, they can be incredibly easy to fall victim to. So how can you reduce the risk of being scammed? By knowing exactly what to look for.  Think you’d be pretty good at spotting a scam? You may well be. But phishing scams can fool the best […]

What’s the Average Ransom Payment for a Ransomware Attack?

Ransomware is a form of cyber attack that holds your data hostage until a ransom is paid. But how much do criminals demand? And what’s the most a business has ever paid? Let’s take a look… If your business was the target of a ransomware attack, how much do you think you’d be asked to […]

What Damage Can a Phishing Attack Do?

Caught off guard by a phishing attack? What’s the worst that could happen? Well, you could lose your data, your money, or even your customers. Phishing attacks are remarkably simple and easy to carry out, yet their consequences could be devastating. Here in Australia, phishing attacks are among some of the most commonly reported scams. […]

Zero Trust: Is it the Right Approach for Your Business?

Zero trust architecture is fast becoming one of the hottest trends in the IT security world. But while it can bring a huge amount of value, it can also generate some downsides for your business. So is it time to embrace a ‘trust no one’ approach, or is an alternative framework best for your organisation? […]