Latest advice

Securing internet enabled cameras

The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices … read more

Understanding passwords

Passwords are the first line of defence to protect yourself from cyber criminals. But if you don’t choose good passwords they can easily become the weakest link in protecting your personal information online. As users, we are becoming overloaded with … read more

Patching and updating

Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from … read more

Cyber hygiene

Cyber criminals target small Australian businesses because they believe them to have weak cyber security. According to a 2016 report by cybersecurity firm Symantec, 43 percent of spearphising attacks in 2015 were targeted against small businesses. Here are … read more

Cloud computing security

Cloud computing is the practice of using servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings … read more

Developing an incident response plan

Being prepared to respond to a cyber security incident Cyber incidents can occur at any time and can take many forms. An incident may occur in critical systems at a time when key staff are unavailable, or in rarely used systems that may not have a clear … read more

Improving staff awareness

Staff will always be an organisation’s greatest asset and greatest risk—especially when it comes to cyber security. One wrong click by a staff member, whether intentional or not, can destroy networks. Improving staff awareness of cyber security … read more

Strategies to mitigate cyber security incidents

Today, there are hundreds, if not thousands, of cyber security strategies published that tailor to all sorts of infrastructures, market categories and cyber threats. Knowing which strategies apply to your organisation and where to start cyber resilience … read more