Unsecured API and Data Breaches: Lessons and Prevention Strategies

In September 2022, a massive data breach compromised the personal information of nearly 10 million current and former customers of a major telecommunications company. The exposed data included sensitive details such as names, addresses, phone numbers, email addresses, and in some cases, government-issued identification numbers (e.g., Medicare numbers, driver’s licenses, and passports). This incident is […]
Email Hygiene: Removing the bait from phishing hooks

Email remains the primary mode of communication for legal professionals, used to share sensitive client information, case strategies, and legal documents. However, with this reliance on email comes the growing threat of phishing attacks—malicious attempts by cybercriminals to deceive recipients into revealing confidential information or compromising their systems. Phishing poses a significant risk to law […]
How to integrate ACI and Nutanix for Network Administrators

As a Network Administrator efficiency is key during the deployment phase of any project. Efficiency is one of the benefits that come with integrating ACI and Nutanix along with: Automatic creation of a Subnet in the Nutanix Cluster whenever an EPG is deployed in Cisco ACI. Statistics and Visibility within ACI. Support for intra-EPG policies […]
How to Enable Bad Word Filters on a FortiGate for Schools

As a school IT manager, a school administrator or a teacher, you want to keep your students safe from the dark sides of the internet, that sometimes innocent curiosity can find them in. If your school has installed FortiGate’s for protection from external cyberthreats than you can also use it to protect your students from […]
Starting with the Essentials: A Beginner’s Guide to the Essential Eight

According to the ASD in 2023, the average cost of a cybercrime for small businesses was $46,000, medium businesses $97,200 and large businesses $71,600. With the frequency and sophistication of cybercrimes escalating, it is vital to implement robust security measures to safeguard sensitive information and digital assets. The Australian Signals Directorate (ASD) has developed the […]
Strengthening Government Partnerships: The Essential Benefits of the Home Affairs Hosting Certification Framework

Securing Government Data: The Critical Role of the Hosting Certification Framework In an era where critical technological infrastructure is integral to the functioning of government entities, the security and management of data are of utmost importance. The Department of Home Affairs has recognised the need to safeguard sensitive information and has responded by developing the […]
Tech in Gov Wrap Up

By Ella McAlister Two weeks ago, through Emantra, I had the opportunity to experience exhibiting at Tech in Gov 2024 in Canberra. My experience at the conference was insightful and enjoyable, as we exhibited in partnership with the newly merged Exabeam. Day 1: The first day of Tech in Gov kicked off with enthusiasm and […]
How implementing patch management and software updates can protect your business

In 2023 the ASD found that 1 in 5 critical vulnerabilities were exploited within 48 hours. This was despite patching advice being publicly available to mitigate these critical vulnerabilities. With the cost of cybercrime increase 14% in 2023 it is more important than ever to take proactive measures to patch vulnerabilities and keep software updated. […]
7 reasons all organisations should have compliance at the front of mind

Technology and cyber warfare are evolving at a rapid rate with the development of open access AI and RaaS companies are more vulnerable than ever, and the government is trying to catch up with stricter compliance regulations. The importance of adhering to compliance standards is not just to ensure that you stay out of jail […]
Cyber Awareness Training: A key in the defence against cyber crime

Recently the Commonwealth Bank of Australia (CBA) has warned that they expect a rise in cybercrime to 400% above normal levels this tax season, with much of that targeting employees of small and medium businesses. Defending against cyber-attacks like these has become one of the biggest focuses for Australian business. While protective measures such as […]