Blogs
Let’s face it—most cyber awareness training is mundane. Static slideshows. Boring voiceovers. Generic videos that don’t resonate with the real risks your team faces. So how do you create cyber
October is widely recognised as Cyber Awareness Month, and every year, organisations across the globe scramble to squeeze in some form of security training before November hits. But here’s the
Cyber security threats have increased alongside the growth of hybrid and remote workforces, challenging organisations to stay ahead and reinforce defences. In FY2023, Australian businesses reported over 1,100 cyber security
As tax time approaches, the risk of scams targeting your business increases significantly. The Commonwealth Bank of Australia (CBA) reported that they usually see a 400% increase in businesses reporting
Has your organisation accounted for the cyber security concerns created when hybrid working? Securing your hybrid workforce starts with securing the human factor. Hybrid workforces can introduce vulnerabilities such as
For 5.04 billion people worldwide, social media is a part of daily life, used to connect with others and find information. The openness and trust that make social media a
What actions does your organisation take to maximise device security? Perhaps you use a technology solution, such as endpoint management, to monitor devices and enforce some controls. While solutions like
Like phishing training, password management and physical security, safe web browsing should be a key component of your cyber security awareness program. The Australian Signals Directorate reported blocking 67 million
As you set business goals and agendas for the new year, I encourage you to revisit your team’s cyber security habits and give them a refresher. Take this opportunity to
Is cyber security training a box-ticking exercise in your organisation? For too many companies, cyber security training exists to satisfy onboarding procedures or yearly requirements that use traditional approaches to
Brute force attacks are one method that threat actors use to guess a password and gain access to business accounts. Attackers systematically submit all possible password combinations until guessing the
When talking about boosting cyber security in an organisation, many leaders will highlight enforcing multi-factor authentication (MFA) as a solid first step. I, too, endorse the merits of using MFA