Office 365 is a great suite of software, but most business are stuck using only the basics that it offers: Word, Excel, Outlook and PowerPoint. Don’t be fooled by the name. The traditional Office applications are now licensed differently, but Office 365 is so much more than just “Office”. Every version of Office 365 comes
Do you reuse the same password like Mark Zuckerberg did? Here’s a lesson from recent history that is worth bearing in mind the next time you have to set a password. Humans are creatures of comfort. Through our everyday decision-making we actively avoid making our lives more difficult, and that’s not a bad thing… generally.
What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been
When it comes to online threats, certain job titles are more vulnerable than others. If you run a business, it is essential that you identify these vulnerabilities. It is also crucial that you have preventative measures in place to mitigate the risks of cyber attacks. In this post, we will cover the 5 most vulnerable
In the modern world, the likelihood of data breaches and security threats is ever-increasing. Email, in particular, is the leading threat vector for ransomware, phishing, data theft and other attacks. Unfortunately, most businesses simply don’t have the time or the resources to come up with solutions to address these threats – as a result, they
Gone are the days of the benign Nigerian prince sending poorly worded emails that promise recipients untold millions just ripe for the taking … or so we thought. Decades after swindling countless victims around the world, the Nigerian Prince variant of phishing emails continue to lure the unwary. In fact, the classic bait-and-hook scam still
When was the last time you evaluated the efficiency of your business processes? And what about the last time you researched how the latest technology could help you to gain competitive advantage while reducing cost? Like many businesses, your answer is probably along the lines of ‘not sure’ or ‘can’t remember’. If you want to
20 years ago, it was easy to create and administer your own company network. You cabled the computers (typically desktops) in a daisy chain or to a central switch, connected to a modem and accessed the early wonders of Internet and email. There was no such thing as ransomware, data theft was confined to government
It’s been about a year since NotPetya hit, taking several large businesses offline and wreaking havoc from an operational standpoint. DLA Piper and TNT Express are among the major companies still licking their wounds, with both incurring enormous cost to get their businesses back on track. Complex Systems Broken Down and Rebuilt Major law firm
Australian businesses can no longer ignore the financial threat posed by major data breaches. Cyber insurance is becoming increasingly relevant to all levels of business in Australia, and you should expect that premiums will soon be affected by conformance (or non-conformance) to a standard set of data security policies. A serious data breach in your
We recently completed an information security audit for one of our professional services clients that centred around penetration testing – the simulation of a series of attacks intended to reveal weaknesses in the client’s network so they can be remedied before a real-life attacker exploits them. The study took three weeks to execute in full
American security company Symantec boasts one of the most comprehensive repositories of cybersecurity threat intelligence in the world. The company has released their annual report that highlights trends in the cybercrime threat landscape. We have summarised three of the most relevant findings from the perspective of medium and large businesses. You can download the report
Centrepoint Finance is a business finance broker with a national footprint. In this video Megan Muggleton, Chief Technology Officer, talks about the relationship between Centrepoint Finance and Computer One.
IT News reports that last week an IT Manager at Collins Foods, operators of hundreds of KFC stores across the world, accidentally clicked on a malicious link in an email, allowing hackers to briefly take over his or her email account and issue fake invoices to contacts. It’s an illustration of how quickly attackers can
ARN reports that the Office of the Australian Information Commissioner (OAIC) has received 31 data breach notifications in just the first three weeks since Australia’s Notifiable Data Breaches Scheme came into effect on February 22nd. This says a few things: Australian businesses are taking their data privacy obligations seriously. The immediate steady stream of notifications