News and Knowledgebase

Managing Third Party Vendor Risk

Can You Trust Your Providers? Cyber incidents, caused by bad practice. You may wonder how so many cyber breaches occur, and the answer is usually down to a misconfiguration, or a vulnerability discovered in a piece of software. One of the most common sources of these...

Copilot Arrives from Microsoft

Note: Copilot is currently available for Enterprise users with 300+ seats in Australia. No date has been set yet for rollout for SMEs. Microsoft has launched a new AI-powered tool called Copilot for Microsoft 365, set to revolutionise the workflows of both small to...

How To Perform a Cyber Security Risk Assessment

How Do You Perform a Cyber Security Risk Assessment? With most transactions going digital, every business must perform regular cyber security vulnerability assessments. Keeping information technology (IT) systems and internal and external processes safe and secure is...

Copilot Arrives from Microsoft

Note: Copilot is currently available for Enterprise users with 300+ seats in Australia. No date has been set yet for rollout for SMEs. Microsoft has launched a new AI-powered tool called Copilot for Microsoft 365, set to revolutionise the workflows of both small to...

How To Perform a Cyber Security Risk Assessment

How Do You Perform a Cyber Security Risk Assessment? With most transactions going digital, every business must perform regular cyber security vulnerability assessments. Keeping information technology (IT) systems and internal and external processes safe and secure is...

Sharing Your WiFi – Personal Device Security

WiFi has become an integral part of both businesses and homes, providing convenient internet access to users. However, the prevalence of WiFi networks has also given rise to security concerns, especially when it comes to guest and untrusted devices. It's essential for...

read more