How to Avoid a Phishing Attack

Phishing attacks are becoming increasingly common. And while simple, they can be incredibly easy to fall victim to. So how can you reduce the risk of being scammed? By knowing exactly what to look for. Think you’d be pretty good at spotting a scam? You may well be. But phishing scams can fool the best […]
What’s the Average Ransom Payment for a Ransomware Attack?

Ransomware is a form of cyber attack that holds your data hostage until a ransom is paid. But how much do criminals demand? And what’s the most a business has ever paid? Let’s take a look… If your business was the target of a ransomware attack, how much do you think you’d be asked to […]
What Damage Can a Phishing Attack Do?

Caught off guard by a phishing attack? What’s the worst that could happen? Well, you could lose your data, your money, or even your customers. Phishing attacks are remarkably simple and easy to carry out, yet their consequences could be devastating. Here in Australia, phishing attacks are among some of the most commonly reported scams. […]
Zero Trust: Is it the Right Approach for Your Business?

Zero trust architecture is fast becoming one of the hottest trends in the IT security world. But while it can bring a huge amount of value, it can also generate some downsides for your business. So is it time to embrace a ‘trust no one’ approach, or is an alternative framework best for your organisation? […]
Would You Pay Your Way Out Of Ransomware?

What would you do if a hacker gained access to your network, stole your critical business data, and refused to give it back unless you paid a ransom? It might sound like something out of a movie, but it’s a reality some businesses are facing. So… would you pay up, or risk your data being […]
What Does a Phishing Attack Look Like?

Phishing attempts are the most common form of cyber attack. Yet many employees struggle to tell these attempts apart from real communications. In this post, we examine what a phishing attack looks like. We’ll share some examples to help you and your employees remain safe and secure online. It’s 11:00am. You’ve got clients coming in […]
Protecting Your Business: The Importance of Choosing the Right Browser

When it comes to web browsers, it’s important to be mindful of the impact it can have on your online security. As a business, you don’t want to take any unnecessary risks, even if you prefer to steer clear of the IT megabrands. It’s crucial to understand that the browser you choose can have a […]
Communicate Right: Keeping Your Team Safe Across Multiple Chat Channels

The growth of virtual communication has opened new channels for sexual harassment and bullying in the workplace. Microsoft Communication Compliance is a valuable way to keep tabs on inappropriate messaging, without invading your team members’ privacy or undermining their trust. Since the start of the pandemic, chat channels like Microsoft Teams, Google Hangouts and Slack […]
Malware is Getting Harder to Spot. Do You Have a Response and Recovery Plan?

If you’re relying on cybersecurity software to protect you, think again. Recent research shows that almost 80% of all malware delivered via an encrypted connection goes undetected. That’s why every business should have a response and recovery plan. Is your business’s antivirus software up to date? Does it detect malware, too? If your answer to […]
The Office Is On Fire!
What Do You Save?

If your office caught fire tomorrow, what’s the one thing you would save? This simple thought experiment has a very important lesson. Your biggest asset is your data, and the only way to keep that data safe is with a comprehensive disaster recovery plan. It’s a horrible thought. But it does happen, so ask yourself […]