Using Office 365? You’re probably wasting (some of) your money

Office 365 is a great suite of software, but most business are stuck using only the basics that it offers: Word, Excel, Outlook and PowerPoint. Don’t be fooled by the name. The traditional Office applications are now licensed differently, but Office 365 is so much more than just “Office”. Every version of Office 365 comes […]

Read More >


Reusing Old Passwords Spells Future Trouble

Do you reuse the same password like Mark Zuckerberg did? Here’s a lesson from recent history that is worth bearing in mind the next time you have to set a password. Humans are creatures of comfort. Through our everyday decision-making we actively avoid making our lives more difficult, and that’s not a bad thing… generally. […]

Read More >


The Essential 8 from AustCyber

What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been […]

Read More >


Online Threats – The 5 Most Vulnerable Job Titles In Your Staff & How to Protect Them

When it comes to online threats, certain job titles are more vulnerable than others. If you run a business, it is essential that you identify these vulnerabilities. It is also crucial that you have preventative measures in place to mitigate the risks of cyber attacks. In this post, we will cover the 5 most vulnerable […]

Read More >