Latest advice

Securing internet enabled cameras

The convenience of Internet Protocol (IP)-enabled cameras that can detect and stream movement via the internet and local wireless networks mean they have become a popular choice for individuals and businesses looking to keep a watchful eye on homes, offices … read more

Understanding passwords

Passwords are the first line of defence to protect yourself from cyber criminals. But if you don’t choose good passwords they can easily become the weakest link in protecting your personal information online. As users, we are becoming overloaded with … read more

Patching and updating

Software patches are released by device and software manufacturers to fix flaws in previous versions of software, including cyber security vulnerabilities. Timely patching is one of the most important steps you can take to protect your computer systems from … read more

Cyber hygiene

Cyber criminals target small Australian businesses because they believe them to have weak cyber security. According to a 2016 report by cybersecurity firm Symantec, 43 percent of spearphising attacks in 2015 were targeted against small businesses. Here are … read more

Cloud computing security

Cloud computing is the practice of using servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud computing can bring many economic and efficiency benefits for organisations. It also brings … read more