Latest Posts

 

Security

Defining your approach to mobility (Flexibility vs. Security)

Defining Your MDM Journey to “Secure Productivity”. With any tightening of security technologies or practices, there is always going to be a flow-on effect to end users. Today’s super-sophisticated mobile devices and technology platforms give people the power to read, chat, share, view, download, or book pretty much anything in one...
Read More

Mobile Device Management: Keeping your data on the downlow

Getting something to “go viral” is undoubtedly the holy grail of social media success! Maximum reach and hopefully maximum impact. Our devices and digital platforms are intuitively designed to help us share, post, communicate and collaborate without limit, but while that maybe be great for your most recent dancing cat...
Read More

Shining a Light on Shadow IT

Are you carefully and strategically planning to make or expand your move into the cloud? STOP right there! There’s something important we think you need to know! No matter what stage of the cloud adoption journey you think you’re at, there’s an 87% chance some of your data is already...
Read More

Is your password a problem?

Every day, more and more, password compromises and breaches are, at best, blocking productivity and people’s ability to get their jobs done, and at worst, threatening the very existence of businesses, their financial viability, and by extension the job security of their employees....
Read More

Multifactor Authentication

The humble password is implicated in more than 80% of data breaches. Find out how you can increase your security by enabling Multifactor Authentication (MFA) to combat the threat posed by stolen password credentials....
Read More

MaxSec: Proactive cyberthreat protection by Maxsum

From a cyber security perspective, any single email out of the 130-odd emails your average business user receives every day could be like that random unwanted late-night visitor…but you’re unaware as you plough through your inbox every day; open, action, file, repeat....
Read More
The Anatomy of a Cyber-Attack Explained

The Anatomy of a Cyber-Attack Explained

Fraud is nothing new – people have been tricking other people into parting with their money since money was invented. But while the internet has made many things easier and faster, so too has the internet made it easier for fraudsters to get at things that don’t belong to them....
Read More

GDPR – What’s with all the emails?

Over the last week you will have noticed a constant stream of emails into your inbox drawing your attention to new privacy policy roll-outs, or asking you to re “opt-in” to services. That’s because on May 25, 2018 the European Union’s General Data Protection Regulation (GDPR) came into force. Whilst these...
Read More

Notifiable Data Breach Scheme – Response Planning 101

February 22, 2018 was a big day in Australia’s data compliance history. Although it probably wasn’t marked on your calendar – it certainly was on ours, because it means all new things for very broad swathe of Australia’s business community. ...
Read More