The Definitive Guide to Remote Working in Australia

Remote working is testing the digital maturity of businesses across Australia. Download Remote Working: The Definitive Guide for Businesses & Employees to better understand the best practices.

How Has Your Business Responded to Working Remotely During COVID-19?

COVID-19 continues to be a major challenge for businesses around the world. An optimum IT resilience plan is critical in assisting staff to work remotely.

Cybersecurity Newsletter January 2020

Welcome to the January edition of Huon IT's Cybersecurity Update.

IT Security: How to Identify a Scam Email

There are some simple tips every business can follow to help reduce the risk of being impacted by email scams. This post explores our top 10 tips for identifying a scam email.

What Is Penetration Testing and Why Is It Important?

How effective is your current security system against a real-world targeted attack? It’s no longer enough to put security tools into place and hope for the best. One of the most important tools that companies can use to defend themselves from cyber attacks is that of penetration testing.

Phishing Scams: Spear Phishing vs Whaling

Phishing scams are the most common scam impacting Australians. Australians lost more money to scammers in 2017 than in any other year since reporting began by the ACCC. In this post, we’ll look at the difference between two common phishing scams: spear phishing and whaling.

Three Reasons Why Cybersecurity Awareness Training is Important to Your Business

Your employees are frequently exposed to sophisticated phishing and ransomware attacks. Cybersecurity is no longer the sole responsibility of your IT department. It’s everyone’s business. 

6 Key Insights From Webroot's 2018 Threat Report

Webroot recently revealed the results from their 2018 edition of its annual threat report. Outlined in this post are six key insights from their report.

An Effective Cybersecurity Leader

With Cyber-attacks and vulnerability admissions flooding our media channels weekly, Cyber-resiliency has well and truly transformed how every individual and organisation works. This isn’t new news, although it raises the question - are you confident that you’re being an effective Cybersecurity Leader?  

Australia's Data Breach Laws

According to the passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017, on the 23rd of February any eligible data breaches will need to be reported to the Office of the Australian Information Commissioner and individuals effected.