Category: Blog

Cracking the CVE Code: A Primer on Cyber Vulnerabilities & Exposures

When it comes to cybersecurity, the Common Vulnerabilities and Exposures (CVE) system, managed by MITRE Corporation, plays a vital role

Less Spend, More Security: Optimizing Your Cybersecurity Budget

IT teams often grapple with the delicate balancing act of dedicating enough resources to cybersecurity while not straining their budget.

Zero-Day Vulnerabilities Uncovered: Strategies for Protecting Your Business from the Unknown

Amidst an extensive range of cyber threats, zero-day vulnerabilities present

Outsmarting the Thief: Protecting Your Business from Identity Theft and Fraud

In a world where technology and innovation continue to redefine the way we live and work, the dark underbelly of cybercrime thrives, exploiting

Combatting Alert Fatigue in Cybersecurity Operations

In today’s ever-evolving threat landscape, cybersecurity professionals are the first line of defence against a wide array of cyberattacks. As technology

ChatGPT – 2023’s Biggest Security Threat?

You’re going to hear a lot about ChatGPT and other AI tools this year. The technology hit mainstream momentum very quickly over the

Phishing Tools Are More Sophisticated Than Ever; How To Think About Email Security In 2023

Caffeine could be like any other cloud-based email Internet service. It has three service pricing tiers – “Basic”, “Professional” and “Enterprise”

Our Cybersecurity Predictions For 2023 – Threats Will Be Bigger, Faster, And Higher Risk

Cybersecurity was already a board-level concern, but after several very high-profile breaches in the latter half of the year, it’s going to be an even

Are You Cyber Resilient? Measuring and Improving Your Cybersecurity Performance

According to the latest edition of Cisco’s annual Security Outcomes Report, 96 percent of surveyed executives have asserted that security resilience

Email Security Is Keeping Security Leads Awake At Night– What Can Be Done?

The challenge of email security is only getting worse. Data from Proofpoint in its recent State of the Phish 2023 report shows that 90 percent of security

Have You Got $1 Billion To Spare? If Not, You Need To be Doing More Around Data Privacy

Last year was a difficult year for data privacy and security in Australia. Several high profile, back-to-back data breaches left the majority of Australians

In the era of multi-cloud Information Technology, zero trust security is the only solution

As IT environments have evolved, so too have the security requirements. The traditional, perimeter-based approach to security is no longer

Most organisations suffer data leak via email – the case for email encryption has never been stronger

We’re sending more email than ever. Research shows that 85 per cent of employees are emailing more now that working remotely has become

Good Cyber Security Starts At Home- Here are some of the key strategic considerations

If you were to imagine that cybercrime was a nation, it would be the third largest economy, after the United States and China. It costs businesses

The Five types of Business Email Compromise (BEC) scams according to the FBI

Business Email Compromise (BEC) is a growing problem targeting organizations of all sizes across the world. It is a type of cybercrime scam in

Understanding what Penetration Testing is, when it is required and its benefits

Penetration Testing is a type of security testing used to find flaws in the system. This is done in order to take appropriate security measures

Security Awareness is key to Cybersecurity behaviour change- What it is and its benefits

Nowadays all our business activities are online. We work, communicate, and interact online, and our reliance on cyber security has increased

The rise of Artificial Intelligence and its impact on Cybersecurity products and services

We live in an increasingly digitised world. The security and safety of our data have become paramount. With so much at risk of cyberattacks

The best ways to protect your organisation against Business Email Compromise scams

How to protect against BEC attacks In the last post, we discussed the different types of BEC scams. Now we

Endpoint Security and its increasing importance in the age of remote work

What is it? Gartner defines an endpoint protection platform (EPP) as a solution used to “prevent file-based malware attacks, detect

Zero Trust is an Approach not a Technology Product- History, Principles and Types

Zero trust is a security model based on the premise that no one is blindly trusted and allowed to access

The five major Cybersecurity Trends to look out for in 2022

The ever-growing online nature of our lives presents opportunities for online attackers. This makes it important for us to be

Cutting through the jargon; why every security operation needs SIEM, SOC and MDR

IT security is filled with jargon, and that can make it obtuse at the best of times. However, there are three terms that are particularly worth understanding

The Australian Cyber Security Centre has issued an urgent advisory

It has said that organisations should act now and follow ACSC’s advice to improve their cyber security resilience in light of the heightened threat environment.