The Essential 8 from AustCyber

What are the ASD Essential 8

What Are the Essential 8? The Essential 8 are a prioritised list of mitigation strategies that help organisations of all sorts to protect their systems against cyber threats. Although no standalone mitigation strategy is guaranteed to prevent cyber incidents, when implemented together the former Australian Signals Directorate estimated that 85% of cyberattacks could have been

2018 Internet Security Threat Report Details Rise of Cryptojacking and Supply Chain Attacks

Information Security

American security company Symantec boasts one of the most comprehensive repositories of cybersecurity threat intelligence in the world. The company has released their annual report that highlights trends in the cybercrime threat landscape. We have summarised three of the most relevant findings from the perspective of medium and large businesses. You can download the report

Is Your Network Safe from Invasion? Why You Should Consider an IT Security Audit

IT security audit in progress

While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose.