Trusted Employees, Partners or Contractors Cause 60% of Cyber-Attacks

It is becoming increasingly well known that people within organisations pose one of the largest threats to cybersecurity. In 2016, Business Insider reported on an IBM security brief which stated, “The bigger problem is that most of these (cyber) attacks are initiated by “insiders,” such as employees, business partners, or third-party contractors. … based on […]

Aruba APAC Atmosphere 2018: Intelligent Edge Capabilities

Aruba Atmosphere

  Aruba APAC Atmosphere 2018 and our time in Bangkok has come to an end.  With over 2000 global wireless and wired network specialists gathered together to discuss intelligent edge capabilities, it’s not surprising that we can highlight some very interesting new products and features coming to market.   The conference focused not only on […]

Should All Australian Businesses adhere to GDPR?

Data Privacy

Are you aware that in three weeks’ time (25th May, 2018), the European Union’s General Data Protection Regulation (GDPR) will come into play? The new legislation is designed to improve the protection of personal data for EU citizens by enforcing new regulations on how data is collected, processed and particularly how organisations obtain consent over […]

Simple Actions to Help Prevent a Cyber Attack

Network Security

Security is the talk of the day. Here are our top 5 simple steps to ensuring you are safeguarding your network. 1. Awareness Ensure your people are aware about the range of high level security threats.    Collaborate across your entire organisation, educating teams about Adware,      Spyware, Viruses, Scams, Spam, Malicious Software, Phishing […]

Harness the power of IoT without the security risk

IoT Security Risk

Do you want to harness the benefits of IoT but have concerns about security? You’re not alone. According to research firm Telsyte, “nearly 90% of Australian CIO’s see IoT becoming important or critical to their organisation within five years”, however half of Australian users surveyed are concerned about security breaches in an increasingly connected world. […]