The Essential Eight Guidelines Explained

The ASD for businesses and government created the Essential Eight Guidelines. This post explains the mitigation strategies to assist organisations in protecting their systems against a range of adversaries.

Why Multi-Factor Authentication is Essential for Every Business

With cyber-attacks on the increase, multi-factor authentication (MFA) is no longer an optional feature for Australian businesses. It’s essential.

Cybersecurity Newsletter June 2020

Welcome to the June edition of Huon IT's Cybersecurity Update.

Prime Minister Announced Large-Scale Cyber-Attack Warning

Australia’s Prime Minister announced that Australia was being hit with a massive cyber attack. Read the recommendations for Australian businesses.

How to Select the Right Password Manager for Your Business

Password breaches are becoming increasingly common and learning how to protect online accounts is more important than ever.

The Definitive Guide to Remote Working in Australia

Remote working is testing the digital maturity of businesses across Australia. Download Remote Working: The Definitive Guide for Businesses & Employees to better understand the best practices.

How Has Your Business Responded to Working Remotely During COVID-19?

COVID-19 continues to be a major challenge for businesses around the world. An optimum IT resilience plan is critical in assisting staff to work remotely.

Cybersecurity Newsletter January 2020

Welcome to the January edition of Huon IT's Cybersecurity Update.

IT Security: How to Identify a Scam Email

There are some simple tips every business can follow to help reduce the risk of being impacted by email scams. This post explores our top 10 tips for identifying a scam email.

What Is Penetration Testing and Why Is It Important?

How effective is your current security system against a real-world targeted attack? It’s no longer enough to put security tools into place and hope for the best. One of the most important tools that companies can use to defend themselves from cyber attacks is that of penetration testing.