Industry News

Website domain name fraud has been an issue for larger businesses for some time, and recent statistics show that many organisations go to great lengths to curb the threat. Proofpoint’s Q4 Quarterly Threat Report states an average defensive domain registration rate of 300 domains per business. Despite these significant numbers, Proofpoint have found that suspiciously

READ MORE

Spear-phishing isn’t going anywhere, and the malicious practice can pose a real threat on an organisational level. IT professionals should employ a multifaceted approach to phishing prevention, with thought given to education, infrastructure and social media practices. Follow these five steps to give your enterprise the best chance to defend all attacks. Check the Integrity

READ MORE

A mobile-targeted cyber espionage campaign dubbed ‘Dark Caracal’ has been uncovered by the Electronic Frontier Foundation and security firm Lookout. The scheme has been in operation since at least January 2012, affecting users in over 21 countries. EFF and Lookout have uncovered the actors of the scheme, stating that the campaign has been operated from

READ MORE

We read a great article by CIO the other day – it was about turning digital transformation into a practical reality. The piece got us thinking about practical considerations when it comes to digital transformation in businesses, and whether it is even feasible for certain businesses to make the digital transition. Read the article here.

READ MORE

With the Notifiable Data Breaches scheme to be enacted within months, the data encryption practices of major companies are becoming subject to greater scrutiny. Companies will be required to disclose all relevant data breaches that occur after the 22nd of February 2018, meaning organisations will need to be proactive with their data encryption policies to avoid

READ MORE

Forbes predicts that by 2025, we’ll have over 80 billion smart devices on the internet. Although IoT simplifies numerous tasks at work and home, there are a number of security risks that come with the technology. Anyone who purchases IoT appliances should be aware of these risks. The information in this post is adapted from

READ MORE

“All Your Wifi Connected Devices Are Potentially Vulnerable” That’s the conclusion from James Walker, MD of Computer One after reviewing international research that also prompted the US Department of Homeland Security to issue an official warning. What’s the story? Well, a wifi security flaw has been discovered and it’s serious. The flaw could be used

READ MORE

Blockchain isn’t going away anytime soon. The transformational technology is an increasingly hot topic in tech circles, and more and more enterprises are looking to invest in the concept. We’ve already introduced you to the basics of blockchain; a flexible and theoretically invulnerable form of decentralised distributed ledger. While the concept has been used for

READ MORE

Infrastructure-as-a-Service is predicted to be the fastest growing aspect of cloud computing in the near future, and organisations are more likely than ever to trust IaaS providers for reliable and flexible infrastructure. Notwithstanding some clear cut disasters, cloud computing is now a very effective option for all metro businesses in Australia. By eschewing the capital expense

READ MORE

Time is crucial in modern business operations, and yet it is still commonplace for larger businesses to use ISDN or PSTN lines and other antiquated communication methods when better options are available. While there can be a large-ish initial outlay on unified communications and IP phone systems, the long-term savings and marketing benefits cannot be

READ MORE