Email Hygiene: Removing the bait from phishing hooks

Featured image showing email icons and clouds

Email remains the primary mode of communication for legal professionals, used to share sensitive client information, case strategies, and legal documents. However, with this reliance on email comes the growing threat of phishing attacks—malicious attempts by cybercriminals to deceive recipients into revealing confidential information or compromising their systems. Phishing poses a significant risk to law […]

How to integrate ACI and Nutanix for Network Administrators

security professionals in room with computers

As a Network Administrator efficiency is key during the deployment phase of any project. Efficiency is one of the benefits that come with integrating ACI and Nutanix along with: Automatic creation of a Subnet in the Nutanix Cluster whenever an EPG is deployed in Cisco ACI. Statistics and Visibility within ACI. Support for intra-EPG policies […]

How to Enable Bad Word Filters on a FortiGate for Schools

As a school IT manager, a school administrator or a teacher, you want to keep your students safe from the dark sides of the internet, that sometimes innocent curiosity can find them in. If your school has installed FortiGate’s for protection from external cyberthreats than you can also use it to protect your students from […]

Starting with the Essentials: A Beginner’s Guide to the Essential Eight

Image of waves of data.

According to the ASD in 2023, the average cost of a cybercrime for small businesses was $46,000, medium businesses $97,200 and large businesses $71,600. With the frequency and sophistication of cybercrimes escalating, it is vital to implement robust security measures to safeguard sensitive information and digital assets. The Australian Signals Directorate (ASD) has developed the […]

Tech in Gov Wrap Up

By Ella McAlister Two weeks ago, through Emantra, I had the opportunity to experience exhibiting at Tech in Gov 2024 in Canberra. My experience at the conference was insightful and enjoyable, as we exhibited in partnership with the newly merged Exabeam. Day 1: The first day of Tech in Gov kicked off with enthusiasm and […]

How implementing patch management and software updates can protect your business

In 2023 the ASD found that 1 in 5 critical vulnerabilities were exploited within 48 hours. This was despite patching advice being publicly available to mitigate these critical vulnerabilities. With the cost of cybercrime increase 14% in 2023 it is more important than ever to take proactive measures to patch vulnerabilities and keep software updated. […]

7 reasons all organisations should have compliance at the front of mind

Technology and cyber warfare are evolving at a rapid rate with the development of open access AI and RaaS companies are more vulnerable than ever, and the government is trying to catch up with stricter compliance regulations. The importance of adhering to compliance standards is not just to ensure that you stay out of jail […]

Cyber Awareness Training: A key in the defence against cyber crime

Cyber Awareness Training Image

Recently the Commonwealth Bank of Australia (CBA) has warned that they expect a rise in cybercrime to 400% above normal levels this tax season, with much of that targeting employees of small and medium businesses. Defending against cyber-attacks like these has become one of the biggest focuses for Australian business. While protective measures such as […]

Vulnerability scanning: a proactive and preventative approach to cybersecurity

Protecting your business from cyber threats is now more critical than ever. With cybercriminals constantly evolving their tactics to steal or compromise sensitive data, staying ahead of potential vulnerabilities is key. This is where vulnerability scanning comes into play. Vulnerability scanning is a proactive approach to cybersecurity, designed to help you identify and address security […]