New announcement. Learn more

Sales & Support | 1300 626 243

Back to Blog

The State of SMB Cybersecurity in 2022

Are you a recent startup company? Do you have a small office? Are you just getting into the digital world? Whatever the situation is, if you are a small business, you also need to have cybersecurity. There are compliance regulations that require any company that stores personal information to provide security for their customers or clients. Why is this? Well, as you know, the privacy of every individual is extremely important to keep, and if a hacker receives any personal information — nam...

August 17, 2022

What a Top-Notch IT Services Provider Will Offer Your Business

There are several reasons why small and medium-sized businesses (SMBs) like yours can sometimes struggle to meet all your technology needs in one location. One reason is that small businesses often lack the resources of large corporations, so making the most of what you have is essential. Another reason is that small and medium-sized businesses suffer the most from sudden personnel losses and extended leaves of absence.  This is why you should think about hiring an external IT service provi...

August 9, 2022

Securing Your Remote Workforce

Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully remote or partial work setup. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure was in place to deal with cybersecurity threats.  However, many companies were forced to make the switch overnight when COVID-19 hit. Very few got the chance to full...

August 3, 2022

Balancing a Proactive and Reative Approach to Cyber Incidents

A cyber incident is a type of security event that can harm a business like yours. Ranging from data breaches and system failures to malware attacks and phishing scams, these incidents can hinder productivity, revenue growth and customer satisfaction.  In most cases, a cyber incident will result in data loss or downtime. This can include loss of confidential information, customer data or business records. In some cases, a cyber incident can also cause business interruption or financial loss....

July 27, 2022

Strengthen Your IT & Data Security to Prevent Cyber Attacks

Strengthen Your IT & Data Security to Prevent Cyberattacks The COVID-19 pandemic has changed everything about the world as we know it. Just as we started embracing new practices like sanitizing, social distancing and remote working, the pandemic has also forced us to embrace systemic changes in the ways we deal with cyberthreats. In 2021, the FBI’s Internet Crime Complaint Center received 847,376 complaints from the Americans, up 7% from 2020, and the potential losses for these complaints exce...

July 20, 2022

Insider Threats: Spotting Common Indicators and Warning Signs

Data protection regulations require your business to assess all possible threats to the sensitive data your business stores or manages. While most businesses tend to focus most of their attention on external threats, they often overlook insider threats that exist right under their collective noses. Although the market is flooded with cybersecurity solutions that promise to protect your business from all kinds of cyber threats, they cannot guarantee or even assure you of protection against inside...

July 6, 2022

Staying Strong on IT Security

Big data is abundant, and it can provide companies with an enormous competitive advantage in terms of marketing and research.  Yet once you’ve got that data, the challenge is to keep it secure.  The increased adoption of web-based, mobile and cloud-based applications means data is accessible from a number of different platforms and therefore vulnerable to hacking and security breaches. Think you can stay ahead of the bad guys? The bad guys stay ahead of everybody… and what’s...

June 29, 2022

The Essential Eight Maturity Model

The Federal Government’s Australian Cyber Security Centre has compiled The Essential Eight mitigation strategies as a starting point to improve cybersecurity.  The Essential Eight are split into three categories: Preventing malware delivery and execution Limiting the extent of cyber security incidents Recovering data and system availability.  This week’s blog discusses the Maturity Model of the Essential Eight. The Maturity Model addresses how organisations who have...

June 22, 2022

Implementing Ongoing Risk Management as a Standard Practice

In 2021, organisations that didn't have zero trust incurred an average breach cost of AUD 2.54 million more than those organisations with a mature zero-trust approach.1 It’s no wonder that 69% of organisations believe that there will be a rise in cyber spending in 2022 compared to 55% in 2021, and more than 25% expect double-digit growth in cyber budgets in 2022.2 With cyberattacks surging due to widespread remote work and increased online interactions during the pandemic, it se...

June 15, 2022

Securing Your Remote Workers

Over the last few years, we have seen several tech companies, such as Buffer, Todoist and Help Scout, to name a few, switch to a fully remote or partial work setup. Most of these companies spent months preparing for the switch by training their employees, setting up remote work policies and ensuring the necessary infrastructure was in place to deal with cybersecurity threats.  However, many companies were forced to make the switch overnight when COVID-19 hit. Very few got the chance to...

June 8, 2022

What is Organisational Agility?

It's hard to predict the future. Just think of all that has happened in the world in the last two years. From the COVID-19 pandemic to supply chain issues to inflation and war, no one could have predicted these events early enough to be adequately prepared. These challenges make it more difficult for companies to succeed and achieve their long-term objectives.  When the needs of your employees, customers and the market change suddenly, you must be ready to make the necessary shift. Pro...

June 1, 2022

How to Build Trust Using Your Business’s Technology

Technology can be a daunting investment for small and medium-sized businesses (SMBs). Between the initial cost and the time and effort it takes to maintain and keep up with technology, it’s little wonder why so many SMBs are hesitant to invest in it. However, when done correctly, technology can be a powerful trust-building tool for SMBs. By having reliable technologies, you can build trust among your people, processes and customers. This trust can result in better outcomes for your compan...

May 30, 2022

4 Reasons Cybersecurity Attack Surfaces Are Expanding

The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape increased at an unprecedented pace. Some of the trends that powered these changes and continue to fuel them are: Increased Use of Internet of Things (IoT)About 56 federal agencies in the U.S. reported using Internet of Things (IoT) tech...

May 18, 2022

Most Companies Expect to Suffer Breaches This Year

Over three-quarters of Australian organisations suffered data breaches over the past year and four in five were hit by ransomware attacks. Seeing as new figures suggest 70 per cent of organisations also expect to be hit this year, have executives become blasé about security? New figures suggest they very well may be. Not only were 80 per cent of organisations surveyed for the Sophos State of Ransomware 2022 report hit by ransomware during 2021 – up dizzyingly from 45 per cent t...

May 11, 2022

How to Prioritise Your Technology Gaps

So why is prioritising technology gaps so important? Today’s technology-based businesses must deal with multiple issues, including cyber threats, head-to-head competition and regulatory compliance. Hence, keeping your technology infrastructure up to date is critical, and a technology audit is the best place to start. A technology audit can assist you in better understanding and identifying gaps in your organization’s security, compliance and backup. A thorough technology audit can assis...

May 4, 2022

Adopt Zero Trust Security for Your SMB

With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead to severe breaches that can damage your business. Zero Trust Security practices, however, can go a long way towards helping small and medium-sized businesses (SMBs...

April 1, 2022

How are Cyber Security and Cyber Threats Going to Look in 2022?

The pandemic and changing working dynamics brought in a massive digital transformation and an unfortunate rise in cybercrimes for many companies and people. Remesh Ramachandran a CISO and Security Researcher wrote on the Entrepreneur Asia Pacific – “2021 saw some of the most significant cyberattacks on digital systems the world has ever seen, such as the Colonial Pipeline ransomware attack, wherein the company had to shut its entire operations to contain the breach. Given the upsurge of...

January 28, 2022

Cyber Security Incident Response Plan

An Incident Response plan provides your team with a roadmap on how to proactively protect your data. Complying with regulations is also important when dealing with sensitive data. If a data breach occurs, you need to know how to deal with that situation and establish what data has been compromised quickly. A report done on Cyber Security in Local Government 15 Western Australian LG entities manage cyber security risks and respond to cyber threats effectively. Appropriate management and...

January 21, 2022

What Cyber Security Policies and Procedures Do You Have in Place?

The recent Auditor General report highlighted areas that are often not addressed in many audited, local government (LG) entities policies or procedures. Only 3 LG entities had adequate cyber security policies to govern and manage cyber security. Nine LG entities had policies that were out of date or did not cover important areas. The remaining 3 LG entities did not have a policy or framework. Without policies that clearly outline the principles and expectations of systems and employees, entities...

December 17, 2021

Remote NW Shire Selects Managed IT to Provide ICT Services

Perth-based Managed IT has been selected as the preferred supplier of Information & Communications Technologies – Service Management (ICT) for the Shire of Derby/West Kimberley (SDWK).Information technology is a critical operational service due to the isolation of the district – SDWK is almost 2,000kms from Perth and consists of approximately 75 staff. Not surprisingly, it suffers from an ICT skills gap.  SDWK also has limited internal staff resources to assist the selected ICT Service ...

December 14, 2021

In 2020, What is Good IT Culture? (Part Two)

In 2020, the challenges for effective IT governance are different than at any time in the past. The rate of change of technology, threats and the shifting world of governance can be challenges to developing and maintaining good IT culture. Last week, in Part One of this blog, we covered the importance of a strategic, rather than technical focus. We also looked at the first prong of good governance, being information governance. This week we are looking at security governance, operation...

February 7, 2020

In 2020, What is Good IT Culture? (Part One)

In 2020, the challenges for effective IT governance are different than at any time in the past.  The rate of change of technology, threats and the shifting world of governance can be challenges to developing and maintaining good IT culture. So, what is good IT culture in 2020? I’m glad you asked. The key issues are: A strategic, rather than technical, focusGovernance: information governance; security governance; operational governanceAccountability and transparency....

January 30, 2020

Information Security and the Australian Privacy Principles

The 13 Australian Privacy Principles (APPs) regulate the handling of personal information by a broad swathe of private, governmental and not-for-profit organisations – known as “APP entities”.  Where an information security or cyber security breach at an APP entity involves personal information, the Office of the Australian Information Commissioner (OAIC) can investigate and has broad enforcement powers and other potential remedies.  A breach of the APPs in relation to personal i...

December 9, 2019

The ‘Scary’ Obligations of Information Governance

IT governance is about responsibilities and consequences. To ‘non-IT’ people, its value is often only highlighted when something goes wrong – when an IT governance failure has real and negative impacts on the organisation and those stakeholders. IT governance is the responsibility of executives and the board of directors. It consists of leadership, organisational structures. It also requires processes that ensure that the enterprise’s IT sustains and extends the&...

December 2, 2019

The Dangers of Shadow IT

Shadow IT is a real threat to effective IT governance in your organisation. It represents systems adopted within your organisation without approval and, more importantly, without consideration or understanding of the broader impact of those actions.The opportunities for Shadow IT have never been greater than they are today. Prevalent and easily-implemented cloud-based systems provide the means, motive and opportunity. They allow functional areas of your organisation to – typical...

December 2, 2019 Posts 1-25 of 57 | Page next