Blogs

Let’s face it—most cyber awareness training is mundane. Static slideshows. Boring voiceovers. Generic videos that don’t resonate with the real risks your team faces. So how do you create cyber

October is widely recognised as Cyber Awareness Month, and every year, organisations across the globe scramble to squeeze in some form of security training before November hits. But here’s the

Cyber security threats have increased alongside the growth of hybrid and remote workforces, challenging organisations to stay ahead and reinforce defences. In FY2023, Australian businesses reported over 1,100 cyber security

As tax time approaches, the risk of scams targeting your business increases significantly. The Commonwealth Bank of Australia (CBA) reported that they usually see a 400% increase in businesses reporting

Has your organisation accounted for the cyber security concerns created when hybrid working? Securing your hybrid workforce starts with securing the human factor. Hybrid workforces can introduce vulnerabilities such as

For 5.04 billion people worldwide, social media is a part of daily life, used to connect with others and find information. The openness and trust that make social media a

What actions does your organisation take to maximise device security? Perhaps you use a technology solution, such as endpoint management, to monitor devices and enforce some controls. While solutions like

Like phishing training, password management and physical security, safe web browsing should be a key component of your cyber security awareness program. The Australian Signals Directorate reported blocking 67 million

As you set business goals and agendas for the new year, I encourage you to revisit your team’s cyber security habits and give them a refresher. Take this opportunity to

Is cyber security training a box-ticking exercise in your organisation? For too many companies, cyber security training exists to satisfy onboarding procedures or yearly requirements that use traditional approaches to

Brute force attacks are one method that threat actors use to guess a password and gain access to business accounts. Attackers systematically submit all possible password combinations until guessing the

When talking about boosting cyber security in an organisation, many leaders will highlight enforcing multi-factor authentication (MFA) as a solid first step. I, too, endorse the merits of using MFA