What is Penetration Testing?

What is Penetration Testing? Penetration testing is a security evaluation executed exactly as a real attacker would. System vulnerabilities are discovered and exploits are launched trying to obtain unauthorized access. The objective is to inform the organization of the security issues that could result by not having the necessary security measures. By Craig Ford – […]

Cybersecurity and the Accountancy Industry

You wanted to know: What are the Main Cybersecurity Problems in Accountancy? All industries have cybersecurity risks that are common between them like patching issues, keeping customer data private and keeping the external-facing parts of their systems hardened and secure. At the very least, every industry needs to uphold these basic standards, otherwise they are […]

Cybersecurity and the Manufacturing Industry

You wanted to know: What are the Main Cybersecurity Problems in Manufacturing? Cybersecurity in manufacturing has several challenges that we need to consider and resolve if we are to make a significant impact on the security landscape. In many manufacturing facilities, two separate networks exist – Information Technology and Operational Technology. By Davichi Cyber Security […]

What is Social Engineering?

Managed IT Services

What is Social Engineering? Social engineering is a method of manipulation of a target for the purposes of getting the target to act in a certain way. It can be something small and simple or as big as transferring $50K to some newly modified account details that the malicious actor convinced you to change for […]

What is Two-Factor Authentication?

A cloud with up and down arrows in a hexagon

What is Two-Factor Authentication? Is it really that important? The majority of services and systems that we use on a day-to-day basis only require a username and password for access. These act as a digital key that allows a user to identify themselves in the system and access sensitive information. With security breaches, digital crime, […]

What to do if you think you have been hacked…

What to do if you think you have been hacked… What To Do Next? This is not a simple answer to give but its something that we get asked all of the time, so here are some basic tips to keep in mind. To best explain we will go through a couple of scenarios that may […]

Are Phone Payment Methods Secure?

You Wanted to Know… Are Smartphone Payment Methods as Secure as Credit Cards? Mobile phone payment methods are something that is starting to become a mainstream ability not just a novelty ability for the early tech adopters. Mobile phone payment methods have become mainstream and are no longer just a novelty for the early tech […]

Is antivirus enough?

Red circle security alert symbol with exlamation mark

It has become clear of late that many don’t see the urgency or need for cyber insurance or simply don’t understand what it really is for.

Are you Cyber Secure while working from home?

Are you vigilant with your Cyber Security while working from home? As the Coronavirus continues to spread across the globe, governments, businesses, and individuals are trying to work out what it means for them and how to protect themselves and their systems. By Cyber Security Team Headline news and global disorder are tools malicious actors […]

Cybersecurity Predictions 2020

Key-hole lock inside four hexagons of various sizes

Cybersecurity Predictions & Recommendations We’ve gathered our predictions and recommendations for cybersecurity in 2020 to help you stay on top of your systems next year. By Craig Ford – Cyber Security Specialist Download a copy here Click here Need more information? For more information on cyber security, Click Contact Us, or call us on +61 […]