SEARCH RESULTS
Showing 10 of 92 results.
Time to rebrand? Here's how to tell
Is it time to think about rebranding your business?
Preparing your business for BYOD
The growing adoption of personal smart devices in recent years has seen an increase in private device use in the workplace.
Be alert to phishing
Every day Australian businesses are being targeted by cyber scams. According to Scamwatch, between January and March 2021, there have been 14,226 reports of phishing with a revenue loss of $659,517.
2,235 of these were email phishing scams.
Ten cyber security terms you should know and understand
Do you know your ransomware from your malware? Your phishing from your hacking? Here is a quick and easy guide to key terms businesses and employees should be across.
Working from home permanently: the pros and cons
Shutdown restrictions introduced in March to slow the spread of COVID-19 forced thousands of Australian businesses to shutter their premises and implement working from home.
7 ways to cut costs and boost your cash flow
When times get tough, businesses must do what they can to protect their cash flow to keep operations going. One way to do that is to look at cutting your costs to prevent a decrease in revenue depleting your profitability. Here are seven things you can do to reduce your business expenses.
ChatGPT-based phishing attacks pose growing threat
New threat actors are spreading malware through the use of fraudulent ChatGPT sites.
Cybercrime-as-a-service on the rise
One of the latest trends in cybercrime is the emergence of a frontier where criminals can purchase cybercrime services, such as malware development or distributed denial-of-service (DDoS) attacks, on a pay-per-use basis.
The ins and outs of data breaches Australia
If you collect personal information in your business, you need to understand your obligations regarding storing, maintaining and protecting customer and employee data. Let’s demystify data and what to do if there’s a data breach.
Are BYODs putting your business at risk?
Cyber attacks are rampant. Organisations that use a bring your own device (BYOD) strategy can use simple but effective strategies to better secure their network.