Blog

A hand under a shield representing ASD Essential 8 security controls A hand under a shield representing ASD Essential 8 security controls

Which Essential controls should be at the top of your list?

15 March 2019

Plenty of good guidance is available to help improve an organisation’s information security. In Australia and New Zealand organisations such as the Australian Signals Directorate (ASD) and Cert NZ publish very useful lists, to help us prioritise which controls to implement, based on the threat and incident data that is available to them.

Read More
Close up of a keyboard with the words cyber security on a key Close up of a keyboard with the words cyber security on a key

Cybersecurity continues to be a hot topic in 2019

31 January 2019

2019 is off to a very hot start. In case you missed them, some of the notable IT security items that hit the news in December and January included - A massive data breach exposed the private data of 500,000 guests of the Marriott International hotel chain and a high percentage of this data included passport and credit card numbers.

Read More
Illuminated icon of a cloud connecting to other icons relating to cybersecurity Illuminated icon of a cloud connecting to other icons relating to cybersecurity

2.5 Months passed before attackers were stopped

02 November 2018

Data security is a major concern for organisations of any size, type and industry. There are endless examples of small to major data breaches being reported in the media, often very little detail is made available regarding attack vectors, investigative work performed, findings etc. In the last two months a U.S agency called the Government Accounta…

Read More
A vector of a PC, laptop, and tablet connecting to a cloud with the words cloud computing written on it A vector of a PC, laptop, and tablet connecting to a cloud with the words cloud computing written on it

Making Cloud Computing More Secure – The Shared Responsibility Model

25 September 2018

Cloud computing continues to attain increasing levels of investment from organisation’s in ANZ. Whilst this model has removed the burden and complexity of having to build and host systems, to assume the cloud environment is secure is flawed.

Read More

Contact Us Today

Fill in the form below or call us on +64 9 570 2233