There’s no doubt that the use of technology in the classroom has grown exponentially in the last decade. In a 2016 study by Pearson Education, 64% of Australia schools stated they were already working towards using majority online resources. Six years later, and access to computing devices has become essential to facilitate learning in both […]
Read MoreThe DESE ISMS Scheme – A Quick Overview The Department of Education, Skills and Employment’s (DESE, ‘the Department) new Information Security Management Scheme calls for all providers of employment skills, training, and disability employment services to gain ISO27001 and Right Fit for Risk accreditation. The objective of this scheme is to ensure that providers are […]
Read MoreFor many organisations, choosing between an internal IT support team or outsourcing to a Managed Service Provider (MSP) can be a daunting decision. Get it right and you hardly even notice, get it wrong and it’s a never ending nightmare of error messages, frozen screens and viruses. So which decision is the right one? Well, […]
Read MoreApple has kicked off 2022 by unveiling an array of exciting new products during their Peek Performance keynote. Some of the highlights include a desktop Mac complete with new M1 Ultra processor and Studio Display, the third generation of iPhone SE and fifth generation iPad Air. Read on for a quick recap of all the […]
Read MoreHere’s a not-so-fun fact: 95% of organisations have Office 365 mailboxes that are harbouring malicious emails. Many of these socially engineered attacks can slip through your existing defences, landing in your users’ inboxes and leaving your organisation open to potential risks. Furthermore, viruses and phishing attempts can slip through your gateways and, if left undetected, […]
Read MoreRegular Backups Hi everyone, and welcome to the final episode of eight weeks of the essential eight! In this episode we’ll be discussing regular backups, why they’re considered essential, and how you can achieve maturity level one. Let’s begin! The ACSC defines this strategy as: Regular backups of important new/changed data, software, and configuration settings, stored disconnected, […]
Read MoreHi everyone and welcome to episode 7 of eight weeks of the essential eight. In this episode we’re going to discuss multi-factor authentication (AKA MFA), why it’s considered essential, and the maturity level one requirements. The ACSC defines this strategy as: Multi-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users […]
Read MoreHi everyone, and welcome to this week’s episode of eight weeks of the essential eight. In this episode we’re going to discuss the essential eight mitigation strategy ‘configure Microsoft Office macros’, why it’s considered essential, and how to implement maturity level one requirements. Let’s begin! The ACSC defines this strategy as: Configure Microsoft Office macro […]
Read MorePatch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means. What are patches? Patches are fixes in software […]
Read MoreTrying to remember your password for every website, portal, tool and piece of software is borderline impossible. Some organisations like to solve this problem by using a very simple and memorable password, variations of the same password, or worse – the exact same password for everything! That’s just asking for trouble. Simple and memorable passwords […]
Read More