4 Data Loss Prevention Strategies. Which one is right for your Organisation?
101, CoSoSys, Data Loss Prevention, OpswatData loss is a scary word for any organisation that has a responsibility of storing any sensitive, especially customer Personal Identifiable Information (PII). Losses or accidental leaks of PII can result in hefty fines, loss of reputation…
NEW! Acunetix 2020 Web Vulnerability Report- Insights for Web and Application Developers
Acunetix, Vulnerability Management, Web Vulnerability ScanningEvery year, Acunetix publishes an in-depth report of the most common web security vulnerabilities and network perimeter vulnerabilities. Download the Report HERE
Their annual Web Application Vulnerability Report is based on real data taken…
How to Defend against Ransomware with Application Whitelisting
Application Whitelisting, RansomwareRansomware Continues to plague cybersecurity organisations all across Australia. According to Business News Australia, Small-to-medium-sized enterprises (SMEs) in Australia and New Zealand hold the highest rate of Ransomware attacks in the world. …
Four Tips to Combat Compromised Credentials
Comporomised Credentials, Cybersecurity, Flashpoint, Password ManagementContributing Author Brett Williams , APAC Solutions Architect, Flashpoint discusses the key steps needed to protect against a compromised credential breach.
In many cases, passwords are the primary line of defence protecting user accounts…
Mitigate Security Risks On-Premise and in the Cloud with StealthBits new release StealthAUDIT 10.0
Cybersecurity, Stealthbits
Stealthbits recently announced the release of their most ambitious and impressive security platform – StealthAUDIT v10. With security professionals across the world struggling to keep up with the ever-increasing pressure to defend…
Is your Organisation Ready for Remote Workers? 5 Strategies to create a cyber resilient Remote worker Policy
101, Cybersecurity
By Alexander Duffy
The World Head Organisation (WHO) has officially declared COVID-19 a pandemic. With multiple countries in quarantine, the global work force is becoming increasingly confined to work from their…
emt Distribution signs Layer 8 Security to address the human dimension of cyber risk prevention
NewsReseller partners can offer first fully measurable Security Behaviour Framework and Cyber Escape Room training adventures in Australia, New Zealand and Asia
Adelaide, Australia – 18 February 2020: Cyber security software specialist, emt…
The 3 Types of Cyber Threat Intelligence - Which one are you using?
101, Flashpoint, Threat Intelligence, ThreatConnect
By Alex Duffy, CSO emt Distribution
CYBERTHREAT INTELLIGENCE (CTI) is not a buzz-phrase; it’s an essential pillar of a mature cybersecurity strategy. When used and applied correctly, CTI can help security teams prepare for,…
Third time win for emt Distribution at Thycotic International Partner Conference
News
Adelaide, Australia – 1 November 2019: emt Distribution received multiple awards for the third time running at Thycotic’s Partner Conference, Unlocked, held in Monaco 15th – 17th October. Adelaide based emt Distribution was…
By clicking subscribe, you agree to recieve emails from emt distribution.By completing this form you are opting into emails from emt distribution. You can unsubscribe at any time.
emt Distribution presents a cybersecurity blog that covers thoughtful, relevant and topical articles and insights for cybersecurity professionals in Australia, New Zealand, Asia Pacific, Singapore, and Hong Kong. emt Distribution’s blogs, webinars, advisories and on-demand resources tackle today’s cyber threats and how to mitigate them through the ASD and ACSC essential eight framework