Industry News

While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose.

READ MORE

In an evolving cyber security landscape, businesses are searching for means to proactively mitigate the threat of network compromise. While large enterprises are able to hire permanent Chief Information Security Officers to enact overarching security plans, the salaries commanded by CISOs mean they are often out of reach for medium-sized businesses. Smaller organisations are now

READ MORE

The future of information technology is a moving target. New technologies play an ever-increasing role in how our businesses operate, and services and demands can change at an alarming rate. We have made four speculations on the future of IT consulting in Australia’s business landscape. Cyber Security Will Become a Primary Focus for Organisations Organisations

READ MORE

Application Whitelisting has been listed by the Australian Signals Directorate as the most effective strategy in mitigating cyber security threats. Despite this, organisations are often oblivious to the value of application whitelisting, or reticent to go through the process of adopting it. While it may not be a panacea to protecting your digital assets, well-executed application

READ MORE

One of the more valuable services offered by a managed services provider (MSP) is continuous vulnerability monitoring.  It’s an ongoing security process that forms a major pillar of a complete security program. Four important processes underpin continuous vulnerability monitoring: Discovery, Reporting, Prioritisation and Response.  Each of these processes must work continuously and in unison to

READ MORE

When it comes to internet security, the professionals seeking to keep transactions secure can often only be reactive to hackers. New concepts are often introduced, but one that is gaining momentum with IT consultants is blockchain technology. Blockchain was introduced in 2008 and incorporated into the management of BitCoin transactions the following year, but many

READ MORE

Defeating Ransomware, Advanced Persistent Threats and Malicious Insiders In late July our Managing Director, James Walker, teamed up with our network security partner, Cisco, to deliver a webinar on upgrading network security.  We addressed three specific threats: Ransomware, Advanced Persistent Threats (silent malware that is designed to sit undetected on your network for as long

READ MORE

MSP Mentor’s list of the 501 best MSP’s in the world has been published for 2017 and Computer One made the list in a strong place yet again. This year’s rank was 310th.  It’s impressive considering 429 places are taken by US and Canadian companies, with just a handful of rankings going to international businesses.

READ MORE

The American restaurant chain, Chipotle, suffered a 3-week infection of its POS systems from March 24 to April 18 this year.  Customer’s credit and debit card information was stolen during the breach, which was first disclosed on April 25.  Read the detailed story at ITNews. The stolen information could be used to create clone cards, drain

READ MORE

According to IT News, transport giant Toll has received permission to inspect the contents of 8 USB devices it suspects were used to illegally copy its intellectual property by an ex-employee. Currently locked in a legal stoush with the former National Sales Manager for subsidiary NQX, Toll alleges that in the days immediately before his

READ MORE

Hot on the heels of the Mirai botnet of 2016 comes news of a new IoT malware, dubbed Hajime. As reported in Computerworld, Hajime is “like Mirai on steroids” with a more sophisticated method for command and control of compromised IoT devices based on a peer-to-peer network rather than a direct server connection. Estimates so

READ MORE