Over the past decade, there have been many high-profile attacks on industries such as healthcare, government, finance, and retail companies. However other less obvious sectors are also at risk as well. One of these lesser known targets is the real estate sector. While it doesn’t automatically bring cybersecurity attacks to mind, the real estate industry […]
Automation is a common business tool used to make systems and processes more efficient for various industries, from financial services to manufacturing. Companies can automate tasks such as data entry, customer service, and forecasting, increasing productivity and reducing overheads. The cybersecurity industry is also using automation tools in a bid to increase protection against malicious […]
With the number of Australian businesses using the internet rapidly increasing, so too has the number of data breach incidents, most notably in the financial and healthcare industries. Data breach prevention is essential in the age of the internet. With the number of data breaches constantly increasing each year, companies can’t afford not to invest […]
In today’s era of evolving business models, it is important to look at all the different ways your organisation will be affected. Organisations that believe their current security systems are infallible based on using firewall security may find out to their detriment this is not the case. The rise in cybercrime and the shift to […]
If a business experiences a cyberattack it isn’t prepared for, it can be a very challenging and stressful experience, especially if there are no security experts within the business. This article is an outline of some of the points to be considered should the unthinkable happen. But firstly, let’s break down that term cyberattack as […]
In 1994, Bill Gates stated that “banking is essential, banks are not”. While that may have been difficult for us to imagine in 1994, as technology advances, we can see that the financial industry is transforming but not without technology-based challenges. The traditional banking model was extremely ‘people’ centric. Customers would visit ‘bricks and mortar’ […]
Application whitelisting is one of the ‘Essential Eight’ cyber security mitigation strategies established by the Australian Cyber Security Centre (ACSC). It is one of the most effective mitigation strategies in cyber security. The Essential Eight are a list of eight strategies and the ACSC recommends they be implemented to protect the digital assets of businesses. […]
The rise in supply chain attacks over recent years is a clear sign that organisations need to consider them a serious threat. The European Union Agency for Cybersecurity this year predicted a four-fold increase over the next year. These days, endpoint security like stringent password protection, multi-factor authentication and virus scanning, is not enough. Organisation’s […]
The Essential Eight mitigation strategies are a recommended baseline for Microsoft Windows-based networks to combat cybersecurity threats as they make it harder for malicious actors to infiltrate sensitive data or to hijack a system.
With cyber-attacks on the increase here are the top ten steps to improving Office 365 Email Security.