Want to achieve ISO27001 certification but struggling to make headway? Computer One has you covered.

Information Security certification. A mature male looks confused as he reads reams of paper that are the ISO27001 standard.

Many established organisations find it challenging to match their current security policies with ISO27001 standards. Without expert guidance, they worry about needing to overhaul their security systems completely. This concern can lead to inaction.

That’s where Computer One can help. Read on…

Are you following Best Practice in your Disaster Recovery and Business Continuity preparation?

Best practice Disaster Recovery (DR) and Business Continuity (BC) Planning. A man with Asian features prepares for a disaster. He has a bandanna and a military backpack. He is holding a keyboard in one hand and wearing a business suit and tie as well.

Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance.  In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.

Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.

A breach of your systems is highly likely. How will your organisation detect and respond to it?

A system breach is highly likely. How will you detect and respond to it? A worker in his 30's looks around an office that has been compromised by malware.

These days a breach of your systems is no longer unthinkable. Now the battleground has shifted to early detection and response. Two technologies can assist you to defend your network: EDR and SIEM. Discover their essential features and how they work together to dramatically improve your security posture and ability to detect and respond to a breach.

How safe is your network? You won’t know until you run an Information Security Audit

white collar criminal hiding behind acting mask

This week, reports ComputerWorld, an IT Consultant named Steven Oakes was jailed for 3 years for spying on the communications of a share recommendation firm called Port Phillip Publishing (PPP).  In a period from 2012 to 2016, the Victorian man used a device known as a Wi-Fi packet sniffer to copy and then decrypt messages

The Busy Executive’s Guide to Information Security in 2019

Information Security Brisbane, Sydney, Melbourne, Australia

What Are the Likely Security Threats & Developments for 2019? Cyber threats are always evolving, and 2019 is sure to bring a barrage of new and increasingly sophisticated attack sources and techniques. We expect that 2019 will see an increase in the scope and frequency of cyber attacks, and reckon businesses should prepare for multi-pronged

Microsoft 365: What is it, how does it work and what are the benefits for your Small to Medium Business?

What is Microsoft 365? Image of a man holding his hands in the air, wondering

Back in mid-2017 Microsoft released a product called simply: “Microsoft 365: Enterprise”. Its primary target was the high-end commercial market and that’s where the product has been making inroads ever since. But did you know there’s also a version for Small to Medium businesses up to 300 seats? It’s attractively-priced and it’s packed full of