Cybersecurity

CommuniCloud and Jazz Networks will be delivering a free webinar next month to help our clients understand how to build an insider threat program that detects issues and puts in protection measures.

How well do you know the insider threat? Current or former staff, contractors, suppliers, or a trusted business partner, who has or has had authorised access to the organisation’s assets can cause major security problems that threaten a company’s brand and reputation. Measure your knowledge of stolen secrets, data breaches espionage, fraud and network sabotage.

Employing user behaviour analytics to detect internal threats. Machine learning and AI are the latest tools being utilised by businesses to help prevent cybercrime and stop cyberattacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who

Our CommuniCloud Managing Director, Glenn Makowski, was invited to share his knowledge at the 2019 Olive Conference and Trade Exhibition at Albury Entertainment Centre.   Taking place over the 17th to 19th of October, the industry event allowed Glenn to put forward the goings on at CommuniCloud, where we have begun to include cyber-security options as

Implementing an ISO27001 compliant Information Security Management System (ISMS) can be an intimidating task, especially if one has no prior knowledge of the Standard. An ISMS is a systematic approach to managing risks related to valuable information assets (organisation information) to ensure it remains secure. This approach includes people, processes and systems. An ISMS preserves the confidentiality,

Cybercriminals used to rely on broad spam attacks with limited success. Unfortunately, times have changed. Today, highly-targeted email phishing schemes are penetrating the IT systems of major organisations around the world, leading to massive data hacks and security breaches. If it feels like high-profile cyber crimes are in the news every day, it’s because they

Cybercriminals operate at incredible speed. Meaning that today, defending local government networks from cyber attacks is an ever-evolving battle that never stops. Cyber threats, including hackers, proxy groups and threat actors can take advantage of system vulnerabilities within days of them being discovered, and successful techniques will rapidly spread among criminal communities. Scary, right? With

By restricting the number of operating systems and applications that have admin access, you can greatly reduce your risks. Why? Well, admin accounts hold all the keys, so an attacker only needs to get access to one admin login, and they can do a lot of damage. It’s also sensible to regularly review your admin