The Value of Customised Network Security Services from a Virtual CISO

In an evolving cyber security landscape, businesses are searching for means to proactively mitigate the threat of network compromise. While large enterprises are able to hire permanent Chief Information Security Officers to enact overarching security plans, the salaries commanded by CISOs mean they are often out of reach for medium-sized businesses. Smaller organisations are now […]

Read More >


Where Are We Heading? Four Speculations on the Future of IT Consulting in Australia

The future of information technology is a moving target. New technologies play an ever-increasing role in how our businesses operate, and services and demands can change at an alarming rate. We have made four speculations on the future of IT consulting in Australia’s business landscape. Cyber Security Will Become a Primary Focus for Organisations Organisations […]

Read More >


What Is Application Whitelisting? How It Can Fortify Your Business Against Ransomware

Application whitelisting has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to protecting your digital assets, well-executed […]

Read More >


Continuous Vulnerability Monitoring: The Case For A Managed Services Provider

One of the more valuable services offered by a managed services provider (MSP) is continuous vulnerability monitoring.  It’s an ongoing security process that forms a major pillar of a complete security program. Four important processes underpin continuous vulnerability monitoring: Discovery, Reporting, Prioritisation and Response.  Each of these processes must work continuously and in unison to […]

Read More >


Technology And Techniques – Machine Learning To Prevent Cyber Fraud And Identity Theft

In the battle against cyber fraud and identity theft, we consider programs capable of machine learning to be vital in mitigating risk. Essentially, machine learning is a form of artificial intelligence written into software that can predict accurate outcomes based on detailed analysis of past events. By building algorithms that can apply statistical analysis to […]

Read More >


The Potential of Blockchain Technology For IT Consultants – Can It Revolutionise Information Security?

When it comes to internet security, the professionals seeking to keep transactions secure can often only be reactive to hackers. New concepts are often introduced, but one that is gaining momentum with IT consultants is blockchain technology. Blockchain was introduced in 2008 and incorporated into the management of BitCoin transactions the following year, but many […]

Read More >


The Rise Of Cyber Fraud And Identity Theft – What IT Service Providers Should Know

We know cyber fraud and identity theft to be common threats in the digital age, but the scale of the problem in Australia might come as a shock. A 2016 report from the Australian Competition And Consumer Commission found that Australians were defrauded out of $300 million in 2016, with 40 per cent of that […]

Read More >


View our Webinar on Defeating Ransomware, Advanced Persistent Threats and Malicious Insiders

Defeating Ransomware, Advanced Persistent Threats and Malicious Insiders In late July our Managing Director, James Walker, teamed up with our network security partner, Cisco, to deliver a webinar on upgrading network security.  We addressed three specific threats: Ransomware, Advanced Persistent Threats (silent malware that is designed to sit undetected on your network for as long […]

Read More >