Small and mid-sized businesses (SMB) aren’t exempt from cybercrime. Just as large enterprises would, they must also create a cybersecurity strategy to protect their business from both external and internal threats. Organisations in the small and mid-size market lack the funding that enterprise level companies have and cannot afford to develop in-house solutions to adequately […]
According to the Australian Cyber Security Centre, over the 2020–21 financial year, the there was an increase in reporting of cyber attacks to reporting of a cyber attack every 8 minutes compared to one every 10 minutes last financial year. These incidents are increasingly on the rise and with many Australians using only 5 or
Did you know that the Notifiable Data Breaches (NBD) scheme was established in February 2018 for protecting personal information? Under the scheme, any organisation or government agency covered by the Privacy Act 1988 must notify individuals affected and the Office of the Australian Information Commissioner when a data breach is likely to result in serious harm
Security is evolving, and the future is passwordless. What does this mean? At CommuniCloud, we highly recommend DUO. DUO Passwordless Authentication is a method of verifying identity when a user accesses an application. Instead of relying on a password to authenticate, users can authenticate in the way that works best for them:
Ava Reveal allows your organisation to monitor, analyse, and understand activity across your users and endpoints. Reveal helps your security team prevent data leaks and loss, detect threats, and train employees on cyber hygiene and compliance requirements. The Reveal Agent is responsible for collecting information, hosting policies, and taking actions when commanded by the operator directly or when triggered by
Cybersecurity is continuously evolving. The nature of cyber threats one month can be completely different from the threats that pop-up the following month. As IT teams struggle to keep up with the constant cyber threats, gaps can start to form within their organisational structure. While this can be concerning for IT teams, there are several
Identify and Track Risky Employees Insider threats can come from different parts of your organisation or the supply chain. They can emerge from different users, like departing employees, home workers, contractors and business partners, or suppliers. Ava Reveal allows you to identify insiders who put your data at risk, knowingly or unknowingly regardless of which