Remote working is testing the digital maturity of businesses across Australia. Download Remote Working: The Definitive Guide for Businesses & Employees to better understand the best practices.
COVID-19 continues to be a major challenge for businesses around the world. An optimum IT resilience plan is critical in assisting staff to work remotely.
Welcome to the January edition of Huon IT's Cybersecurity Update.
There are some simple tips every business can follow to help reduce the risk of being impacted by email scams. This post explores our top 10 tips for identifying a scam email.
How effective is your current security system against a real-world targeted attack? It’s no longer enough to put security tools into place and hope for the best. One of the most important tools that companies can use to defend themselves from cyber attacks is that of penetration testing.
Phishing scams are the most common scam impacting Australians. Australians lost more money to scammers in 2017 than in any other year since reporting began by the ACCC. In this post, we’ll look at the difference between two common phishing scams: spear phishing and whaling.
Your employees are frequently exposed to sophisticated phishing and ransomware attacks. Cybersecurity is no longer the sole responsibility of your IT department. It’s everyone’s business.
Webroot recently revealed the results from their 2018 edition of its annual threat report. Outlined in this post are six key insights from their report.
With Cyber-attacks and vulnerability admissions flooding our media channels weekly, Cyber-resiliency has well and truly transformed how every individual and organisation works. This isn’t new news, although it raises the question - are you confident that you’re being an effective Cybersecurity Leader?
According to the passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017, on the 23rd of February any eligible data breaches will need to be reported to the Office of the Australian Information Commissioner and individuals effected.