Blogs

Human firewall for remote work security
Security Behaviour

The human firewall: How team training strengthens remote work security

Cyber security threats have increased alongside the growth of hybrid and remote workforces, challenging organisations to stay ahead and reinforce …

Read More »
Security Behaviour

4 strategies to prevent tax time scams in your business

As tax time approaches, the risk of scams targeting your business increases significantly. The Commonwealth Bank of Australia (CBA) reported …

Read More »
Safe at Home and Work: Understanding Cyber Security in a Hybrid World
Security Behaviour

Safe at Home and Work: Understanding Cyber Security in a Hybrid World

Has your organisation accounted for the cyber security concerns created when hybrid working? Securing your hybrid workforce starts with securing …

Read More »
Security Behaviour

How threat actors exploit social media to attack your business

For 5.04 billion people worldwide, social media is a part of daily life, used to connect with others and find …

Read More »
3 habits to maximise device security
Security Behaviour

Maximising device security: 3 habits your team should implement

What actions does your organisation take to maximise device security? Perhaps you use a technology solution, such as endpoint management, …

Read More »
The importance of adding web safety to your cyber security awareness program
Security Behaviour

The importance of adding web safety to your cyber security awareness program

Like phishing training, password management and physical security, safe web browsing should be a key component of your cyber security …

Read More »
5 ways to revitalise your team’s cyber security habits in the new year
Security Behaviour

5 ways to revitalise your team’s cyber security habits in the new year

As you set business goals and agendas for the new year, I encourage you to revisit your team’s cyber security …

Read More »
3 reasons to use gamified training for cyber security
Security Behaviour

Where your current cyber security training program falls short

Is cyber security training a box-ticking exercise in your organisation? For too many companies, cyber security training exists to satisfy …

Read More »
Why implement an account lockout policy in your business?
Security Behaviour

Account Lockout Policies: A strong defence against unauthorised logins

Brute force attacks are one method that threat actors use to guess a password and gain access to business accounts. …

Read More »
Unmasking multi-factor authentication risks
Hints and Tips

Unmasking the hidden risks of multi-factor authentication

When talking about boosting cyber security in an organisation, many leaders will highlight enforcing multi-factor authentication (MFA) as a solid …

Read More »
5 steps to building an insider threat program
Security Behaviour

5 ways to prevent insider threats in your business

When thinking of cyber security threats, you likely imagine an external actor forcing access to your business. In reality, the …

Read More »
Practical strategies for mitigating the risks of Business Email Compromise
Security Behaviour

Practical strategies for mitigating the risks of Business Email Compromise

Despite many other communication platforms becoming central to how we communicate at work, email has remained a key target for …

Read More »