Small and mid-sized businesses (SMB) aren’t exempt from cybercrime. Just as large enterprises would, they must also create a cybersecurity strategy to protect their business from both external and internal threats. Organisations in the small and mid-size market lack the funding that enterprise level companies have and cannot afford to develop in-house solutions to adequately […]

internet, cyber, network-3589685.jpg

According to the Australian Cyber Security Centre, over the 2020–21 financial year, the there was an increase in reporting of cyber attacks to reporting of a cyber attack every 8 minutes compared to one every 10 minutes last financial year. These incidents are increasingly on the rise and with many Australians using only 5 or

eye, iris, biometrics-2771174.jpg

Did you know that the Notifiable Data Breaches (NBD) scheme was established in February 2018 for protecting personal information? Under the scheme, any organisation or government agency covered by the Privacy Act 1988 must notify individuals affected and the Office of the Australian Information Commissioner when a data breach is likely to result in serious harm

headhunt, ticked, personnel-311354.jpg

Security is evolving, and the future is passwordless. What does this mean? At CommuniCloud, we highly recommend DUO. DUO Passwordless Authentication is a method of verifying identity when a user accesses an application. Instead of relying on a password to authenticate, users can authenticate in the way that works best for them:

Many organisations are starting to build a cyber security strategy as cybercrime is on the rise. When it comes to an organisation evaluating its cyber security landscape and identifying gaps, where do you start?

technology, network, business-3464630.jpg

Do your Part. #Be Cyber Smart October is Cyber Security Awareness Month. Now is the time, to take steps to protect yourself from common online threats and cybercrime. Every day we spend a lot of time taking safety measures. We put on our seatbelts when driving a car. We wear a helmet when riding a

network, keyboard, hand-3664108.jpg

Ava Reveal allows your organisation to monitor, analyse, and understand activity across your users and endpoints. Reveal helps your security team prevent data leaks and loss, detect threats, and train employees on cyber hygiene and compliance requirements. The Reveal Agent is responsible for collecting information, hosting policies, and taking actions when commanded by the operator directly or when triggered by

Cybersecurity is continuously evolving. The nature of cyber threats one month can be completely different from the threats that pop-up the following month. As IT teams struggle to keep up with the constant cyber threats, gaps can start to form within their organisational structure. While this can be concerning for IT teams, there are several

Identify and Track Risky Employees Insider threats can come from different parts of your organisation or the supply chain. They can emerge from different users, like departing employees, home workers, contractors and business partners, or suppliers. Ava Reveal allows you to identify insiders who put your data at risk, knowingly or unknowingly regardless of which