Securing home Wi-Fi – protecting your remote workforce

With close to 60% of Australian managers and professionals either working from home full time (Source: ABS.gov.au), or at least a couple of days per week, the need to consider the security of the home working environment continues to be an area of concern for business owners.  While we can encourage our teams to avoid […]

Why Anti-Virus Alone Won’t Protect Your Business

In years gone by, viruses were the biggest threat to your computers, and because of this, anti-virus software became big business. But in an era where businesses are scrambling to defend against much more sophisticated cyber threats, anti-virus software isn’t enough to protect you and your business from the evolving threats in the cyber landscape. […]

The Human Element:  Why Cybersecurity training is crucial for your employees

In today’s digitally driven world, cybersecurity for your business is more important than ever. With the ever-increasing frequency and sophistication of cyber threats, protecting your company’s sensitive information and data has become a top priority.  While investing in robust security software and systems is essential, it’s equally crucial to recognise the human element in your […]

Credential stuffing – What is is and why you should care

You may have heard recently about the credential stuffing incident involving some 15,000 customers of a number of big brands, including Guzman y Gomez, Dan Murphy’s, Event Cinemas and Binge – just to name a few. The incident has seen some compromised customers losing hundreds of dollars through transactions that were processed on their accounts. […]

The impact of your email address and how it could cost your business

In today’s digital age, a professional online presence is vital for businesses to establish trust. Yet, the often neglected, but crucial component of this digital presence is the email address. While @bigpond.net.au or @gmail.com are convenient, relying on them for your business might be costing you more than a bit of trust. Let’s unpack why. […]