If a business experiences a cyberattack it isn’t prepared for, it can be a very challenging and stressful experience, especially if there are no security experts within the business. This article is an outline of some of the points to be considered should the unthinkable happen. But firstly, let’s break down that term cyberattack as […]
Application whitelisting is one of the ‘Essential Eight’ cyber security mitigation strategies established by the Australian Cyber Security Centre (ACSC). It is one of the most effective mitigation strategies in cyber security. The Essential Eight are a list of eight strategies and the ACSC recommends they be implemented to protect the digital assets of businesses. […]
The rise in supply chain attacks over recent years is a clear sign that organisations need to consider them a serious threat. The European Union Agency for Cybersecurity this year predicted a four-fold increase over the next year. These days, endpoint security like stringent password protection, multi-factor authentication and virus scanning, is not enough. Organisation’s […]
The Essential Eight mitigation strategies are a recommended baseline for Microsoft Windows-based networks to combat cybersecurity threats as they make it harder for malicious actors to infiltrate sensitive data or to hijack a system.