Blogs

5 steps to building an insider threat program

When thinking of cyber security threats, you likely imagine an external actor forcing access to your business. In reality, the next threat to your company could be someone unintentionally sharing

Practical strategies for mitigating the risks of Business Email Compromise

Despite many other communication platforms becoming central to how we communicate at work, email has remained a key target for cyber criminals. Why? Many businesses rely on email to issue

Are AI attacks the next big cyber security challenge for businesses?

AI has permeated various aspects of our personal and professional lives, from the voice assistants in our homes to the platforms collating and delivering business data. AI adoption in business

8 essential components of a solid cyber security plan

Many of us have made the move to digital workplaces. We hold meetings, send messages, collaborate and share data on digital platforms from multiple locations. While all of this has

cyber security awareness

As a Managed Service Provider (MSP), you are responsible for assisting your clients with protecting their IT infrastructure, which increasingly requires sensitivity and awareness regarding cyber security. Even if you

impact of ransomware

Ransomware attacks have emerged as a significant threat to businesses of various industries and sizes. These attacks are particularly insidious because they not only compromise the security of your company’s

cyber security audit

The latest Cyber Threat Report by the Australian Cyber Security Centre (ACSC), covering the period of July 2021 to June 2022, reported a 14% increase in the monetary costs of

A cyber security baseline is a set of essential practices and policies that your organisation must observe to maintain a secure IT infrastructure. Creating a baseline includes understanding your people,

cyber security and behaviour audit

A cyber security and behaviour audit identifies vulnerabilities in an organisation’s digital systems and physical security by targeting user behaviour that could result in a data breach. It involves assessing

How cyber security games improve response time to threats

Your response time to cyber attacks is paramount to minimising damage. The latest report from the Office of the Australian Information Commissioner (OAIC) reported that from January to June 2022,

cyber security training to strengthen your business

Too many leaders focus on taking the tech-based route when it comes to cyber security. They focus on acquiring software and working with an outsourced security provider to protect their

cyber security awareness

Cyber security training has become critical, especially in light of the recent Optus data breach. With details such as email addresses and phone numbers leaked, people must be vigilant about

Layer 8 Security
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.