What Is Endpoint Detection and Response (EDR)

What Is Endpoint Detection and Response (EDR) Introducing EDR and answering your most pressing questions, this guide dives into Endpoint Detection and Response, a modern approach to endpoint security. EDR goes beyond traditional antivirus by proactively detecting suspicious behaviour and responding before harm is done. Read more for an in-depth look at EDR and MDR […]

What Is Endpoint Detection and Response (EDR) Read More »

HubSpot investigating customer account hacks

HubSpot Investigating Customer Account Hacks Software firm HubSpot is investigating a cyber security incident that targeted its customers. “On June 22, we identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain unauthorised access to their accounts,” a HubSpot spokesperson told Reuters in an emailed statement. HubSpot is

HubSpot investigating customer account hacks Read More »

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon?

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Protecting Your Customers From SMS Scams. Scammers are increasingly targeting unsuspecting individuals through text messages, often impersonating legitimate companies like banks or telcos. These scams can result in significant financial losses and reputational damage for your business. The

Stop SMS Scams Before They Hit Your Customers: A Mandatory SMS Sender ID Registry on the Horizon? Read More »

security, professional, secret-5199236.jpg

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks This month’s newsletter brings a stark reminder of the ever-present threat of cybercrime, even for large organisations with robust IT infrastructure. A recent Victorian government audit revealed hackers infiltrated a central database and altered supplier bank details on four separate occasions over a year

Are Your Supplier Payments at Risk? Protecting Your Business from Cyberattacks Read More »

Optus Must Reveal Parts of Data Breach Report in Lawsuit

Optus Must Reveal Parts of Data Breach Report in Lawsuit Optus attempt to keep a Deloitte report on their 2022 data breach hidden has failed. A Federal Court decision allows law firm Slater and Gordon, representing over 10,000 affected customers, access to portions of the report for their class action lawsuit. This ruling means the

Optus Must Reveal Parts of Data Breach Report in Lawsuit Read More »

The Three-Pronged Approach to Conquering Cyber Security

The Three-Pronged Approach to Conquering Cyber Security Cyber threats are constantly evolving, making it a challenge to keep your organisation’s data and systems secure. While some might think the answer lies solely in the latest tech, the most successful approach utilises a three-pillar approach to cybersecurity: People, Processes, and Technology. People: Your Human Firewall People

The Three-Pronged Approach to Conquering Cyber Security Read More »

MediSecure Data Breach May Impact Personal Health Information

Australian prescription service MediSecure has announced a data breach potentially affecting personal and health information of individuals. The company blames a third-party vendor for the incident and is working with authorities to investigate further. Here’s a breakdown of the situation: Data potentially compromised: Personal and health information related to prescriptions. Scope: Unclear at this stage,

MediSecure Data Breach May Impact Personal Health Information Read More »

Future-Proofing Security: A Guide to SOC Transformation

Security Operations Centers (SOCs) are on the front lines of cybersecurity but face mounting challenges. Traditionally, SOCs relied on constant vigilance to detect and respond to threats across networks, applications, and devices. However, today’s sprawling attack surfaces and ever-evolving threats make this a daunting task. Legacy SOC setups struggle to keep pace, leaving organisations vulnerable.

Future-Proofing Security: A Guide to SOC Transformation Read More »

Lack of Confidence in Cybersecurity Strategy Loses Deals

Businesses Losing Deals Due to Lack of Confidence in Cyber Security Strategy A new report 2024 State of the Security Team: Navigating Constant Change Research Report, reveals a concerning disconnect between security professionals and their customers in Australia and New Zealand (ANZ). While 81% of security leaders feel confident in their cybersecurity defences, a significant

Lack of Confidence in Cybersecurity Strategy Loses Deals Read More »

From Vulnerable to Vigilant: Security Customer Case Study

From Vulnerable to Vigilant: Australin IT Services Management Firm Fortified its Security Posture The Client A leading Australian IT service management firm with a global presence felt increasingly exposed in today’s ever-evolving cyber threat landscape. With a large employee base and vast amounts of client data entrusted to them – a robust security posture was

From Vulnerable to Vigilant: Security Customer Case Study Read More »