The Pros (and Cons!) of ISO 27001 for Australian SMEs Each year, the number of cyber risks faced by small and medium-sized enterprises (SMEs) increases. These risks don’t just impact the business; customers and suppliers are now
116 Gawler Place, Adelaide SA 5000 1800 818 875 [email protected]
The Pros (and Cons!) of ISO 27001 for Australian SMEs Each year, the number of cyber risks faced by small and medium-sized enterprises (SMEs) increases. These risks don’t just impact the business; customers and suppliers are now
The Benefits of Restricting USB Access for Employees One of the most underestimated measures for protecting an organisation's data is the restriction of USB access for employees. While USB devices—such as flash drives and external hard drives—offer
How and Why to Block HTM/HTML Attachments in Outlook 365 Microsoft Outlook 365 is one of the most popular business communication tools. However, a particular threat gaining traction is the use of HTM/HTML attachments in emails. This
Building a Positive Cyber Security Culture A successful cyber security culture starts at the top. We often hear the term “a great company culture”. This is typically represented by a supportive work environment, employee growth opportunities, open
Understanding Administrative Privileges: A Guide for Small Business Owners What Are Administrative Privileges?Administrative privileges on computers, simply put, are the permissions granted to users that allow them to make significant changes to computer systems or to access
Fake Invoice Scams: How to Protect Your Business & Your Customers Fake invoice scams involve the unauthorised sending of invoices that are designed to look like they are from legitimate vendors but are actually from cyber criminals.
Next-Generation Antivirus vs. Traditional Antivirus: what’s right for your business? As cyber threats evolve, the way we counteract these threats must also advance. This article outlines the core differences between Next Generation Antivirus (NGAV) and traditional Antivirus
Blocking HTM/HTML Attachments In Google Workspace Understanding how to enhance email security within Google Workspace is important for protecting sensitive business data. One significant step is blocking HTM/HTML attachments, which can be used maliciously in phishing scams
Understanding Microsoft 365 Licences: An Overview for SMEs Navigating the complexities of software licensing can be an exhausting task for small and medium-sized enterprises (SMEs). Microsoft 365 has emerged as a transformative solution, shifting the traditional software