<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=455441907967559&amp;ev=PageView&amp;noscript=1">

How to Keep Your Data Safe in The Cloud

by Powernet - Aug 3, 2020

Today almost every business is using at least one part of the public cloud, be it for your email, website, or business applications. Cloud providers have a responsibility to keep your data safe, but you also hold responsibility. Our infograph talks through what you are responsible vs. what your provider should be covering. 

Read Post
0 Comments

TAGS: it security, cyber security, IT systems, risk, two factor authentication, passwords, Identity Theft, Data Security, Data Loss, IT support

Common Password Mistakes: Infograph

by Powernet - May 12, 2020

We all know the rules - don't use the same password, don't use identifiable information in your password, keep your password secure and don't share it, but we don't always follow them!

Read Post
0 Comments

TAGS: it security, cyber security, IT systems, risk, two factor authentication, passwords, Identity Theft, Data Security, Data Loss, IT support

What is the Average Cost of a Ransomware Attack?

by John Lane - Feb 3, 2020

Ransomware is a form of malware which infects your computer and encrypts all accessible files, rendering them unusable. The malware can also spread rapidly through a network, infecting many computers in a short amount of time, each demanding a separate ransom.

Read Post
0 Comments

TAGS: it security, cyber security, risk, scam, tips, data management

Risk Management in Nonprofit Organisations

by John Lane - Dec 16, 2019

 

The benefits of modern IT are commonly spruiked. Less often discussed. However, are the potential risks. As important as maintaining current infrastructure and adopting modern technology, identifying these risks and planning for a worst-case scenario is the key to risk management in nonprofit organisations.

Read Post
0 Comments

TAGS: risk, how to, tips, NFP, Risk Management

The Top 5 Security Issues SMBs are Facing With Cloud Computing

by John Lane - Oct 7, 2019

Cloud computing has evolved exponentially over the past decade and research indicates that by next year (2020) its global market will exceed US$241 billion – which is more than AU$356 billion. But as cloud computing opportunities have grown, so too have the security issues associated with it.

Read Post
0 Comments

TAGS: cyber security, cloud, risk, Risk Management

Why Your SMB Could Suffer A Cyber Attack This Year

by Lachie Dixon - Sep 24, 2019

Cyber-attacks are becoming more frequent, hackers are becoming smarter, and their attacks are becoming more sophisticated and programmed.

Read Post
0 Comments

TAGS: it security, cyber security, risk

Why Two-Factor Authentication and Password Policies Are Critical for Securing Your Business (and How To Implement Them)

by John Lane - Dec 19, 2018

In an era where the average cost of a single malware attack on a company has risen to a catastrophic $2.4 million, it's safe to say that cybersecurity has never been more important than it is right now. But at the same time, this demands the question: in a world where even large corporations like Yahoo and Uber can become victims overnight, what chance does your small business really have?

Read Post
0 Comments

TAGS: it security, cyber security, risk, end user, business, two factor authentication, passwords

Your Guide to the ASD Essential 8 Strategies (And How to Implement Them)

by John Lane - Nov 29, 2018

Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, risk, strategy, tips, essential 8, webinar, implementation

Australia’s Data Breach Notification Laws Part 4: What's Next?

by John Lane - Jun 21, 2018

Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, disaster recovery planning, leadership, IT systems, legislation, business continuity planning, risk, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 3: Developing a Data Breach Response Plan

by John Lane - Jun 18, 2018

Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.

Read Post
0 Comments

TAGS: it strategy, it security, cyber security, disaster recovery planning, leadership, IT systems, legislation, business continuity planning, risk, notifiable data breaches scheme

Recent Posts