Here’s an easy guide to self-assessing your organisation to Essential Eight Maturity Level One.
How to conduct your own Essential Eight Maturity Level One Assessment.

Here’s an easy guide to self-assessing your organisation to Essential Eight Maturity Level One.
Disaster Recovery and Business Continuity are two much-discussed topics, with universal agreement among executives as to their importance. In practical terms, however, most organisations’ DR and BC plans are not regularly reviewed for their currency or stress-tested for their ease of implementation in an emergency.
Here’s our guide to the best practice in setting, reviewing and regularly testing your DR and BC plan.
This week, reports ComputerWorld, an IT Consultant named Steven Oakes was jailed for 3 years for spying on the communications of a share recommendation firm called Port Phillip Publishing (PPP). In a period from 2012 to 2016, the Victorian man used a device known as a Wi-Fi packet sniffer to copy and then decrypt messages
20 years ago, it was easy to create and administer your own company network. You cabled the computers (typically desktops) in a daisy chain or to a central switch, connected to a modem and accessed the early wonders of Internet and email. There was no such thing as ransomware, data theft was confined to government
As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends back