Blog

A woman with a laptop looking at her phone with a holographic of an artificial Intelligence brain A woman with a laptop looking at her phone with a holographic of an artificial Intelligence brain

It's a hot topic!

15 June 2023

People are increasingly going to be using generative artificial intelligence (AI) systems at work and home with a view to increasing productivity, being more creative and make better data driven decisions. However, managing the risks of using generative AI is a hot topic and should be front of mind for organisations. Some steps worth taking to mana…

Read More
An IT Manager relaxing in a chair knowing that the organisations Microsoft 365 environment is configured securely An IT Manager relaxing in a chair knowing that the organisations Microsoft 365 environment is configured securely

Breathe easy

27 April 2023

How do you validate that your Microsoft 365 environment is configured securely? – staying across this dynamic environment is challenging. Our initial 150 point deep dive Microsoft 365 Security Review, sees our experts gathering relevant information to verify whether your Microsoft 365 is secured properly and key settings are enabled correctly.

Read More
An IT professional reviewing a managed service providers contract on how they preserve the confidentiality, integrity, and availability of the organisations information An IT professional reviewing a managed service providers contract on how they preserve the confidentiality, integrity, and availability of the organisations information

Taking reasonable care

29 March 2023

In our February newsletter we talked about the need to ensure that any third parties engaged to do work for your organisation preserve the confidentiality, integrity, and availability of your information. One of the steps you can take to make improvements in this third-party risk area, is the level of due diligence you should consider applying upfr…

Read More
Business people meeting with third part suppliers going through their information security risk management Business people meeting with third part suppliers going through their information security risk management

Working with third party suppliers

15 February 2023

When it comes to information security risk management, how do you ensure that the third parties engaged to do work for your organisation preserve the confidentiality, integrity, and availability of your information? Often their “work” could include access to your organisation's data, intellectual property, financial, operational, or other sensitive…

Read More

Contact Us Today

Fill in the form below or call us on +64 9 570 2233