4 Data Loss Prevention Strategies. Which one is right for your Organisation?

, , ,
Strategies-data-loss-prevention-choose-right

Data loss is a scary word for any organisation that has a responsibility of storing any sensitive, especially customer Personal Identifiable Information (PII). Losses or accidental leaks of PII can result in hefty fines, loss of reputation and more importantly customer trust and in some cases, it could make or break an organisation. But it is not just the loss […]

NEW! Acunetix 2020 Web Vulnerability Report- Insights for Web and Application Developers

, ,

Every year, Acunetix publishes an in-depth report of the most common web security vulnerabilities and network perimeter vulnerabilities. Download the Report HERE  Their annual Web Application Vulnerability Report is based on real data taken from Acunetix Online. Analysts at Acunetix uses a random selection of websites and web applications protected using their in-house software, anonymise the […]

How to Defend against Ransomware with Application Whitelisting

,

Ransomware Continues to plague cybersecurity organisations all across Australia. According to Business News Australia, Small-to-medium-sized enterprises (SMEs) in Australia and New Zealand hold the highest rate of Ransomware attacks in the world.  The best way to combat the rising ransomware attacks is through effective Application Whitelisting In the first quarter of 2020, ransom demands made […]

Four Tips to Combat Compromised Credentials

, , ,

Contributing Author Brett Williams , APAC Solutions Architect, Flashpoint discusses the key steps needed to protect against a compromised credential breach. In many cases, passwords are the primary line of defence protecting user accounts from being hijacked in an account takeover (ATO) attack. With the right policies and parameters in place to ensure strong, unique passwords, […]

Mitigate Security Risks On-Premise and in the Cloud with StealthBits new release StealthAUDIT 10.0

,

  Stealthbits recently announced the release of their most ambitious and impressive security platform – StealthAUDIT v10. With security professionals across the world struggling to keep up with the ever-increasing pressure to defend their organisations from evolving and sophisticated threat attacks, its essential to have visibility into every part of their systems.  With StealthAUDIT v10, […]

Is your Organisation Ready for Remote Workers?   5 Strategies to create a cyber resilient Remote worker Policy 

,

  By Alexander Duffy   The World Head Organisation (WHO) has officially declared COVID-19 a pandemic. With multiple countries in quarantine, the global work force is becoming increasingly confined to work from their homes. Organisations who were previously not prepared for this shift in the workforce are now left with a need to support remote workers while maintaining business as usual.   Some organisations especially in finance and […]