User Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]
Read MoreHi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]
Read MoreHi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]
Read MoreHello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]
Read MoreAs the world begins to open up and return to some semblance of normality, businesses are now in a debate over how to proceed with the return of staff into offices. Over the last 1.5 years, remote desktop access and cloud technology allowed employees to work from the safety of their own homes, but how […]
Read MoreIn Apple’s September 2021 Keynote ‘California streaming’, the tech giant’s CEO Tim Cook unveiled Apple’s latest product range. The announcement was headlined by the new iteration of the iPhone, and was followed by an introduction of the latest iPads and Apple watches. Read on for a quick recap of Apple’s biggest announcements. iPhone 13 The […]
Read MoreAre Microsoft 365 backups necessary? With benefits like easy access to files, emails, and documents, plus improved collaboration across teams, it’s no surprise that Microsoft 365 is an essential tool for most businesses across the globe. But what happens when your Microsoft 365 data is lost? Downtime as a result of lost or corrupt data […]
Read MoreAs the demand for technology increases in classrooms, the Chromebook vs iPad debate has been an ongoing discussion for schools and parents seeking to make the best technological choices for the development of their students and children. Chromebooks and iPads are currently the forerunners when it comes to portable devices in the classrooms, and […]
Read MoreWith over 15 years experience securing IT systems for all sizes of organisations, the team at eStorm understands that there is no one-size-fits-all solution when it comes to cyber security. We take the time to understand how your business operates and apply a practical approach to ensuring your data is protected. 1. Conduct a […]
Read MoreApple recently announced the latest version of operating systems for both iOS and iPadOS, so what new features can we expect? The new features are set to help user productivity, improve FaceTime experiences, bring more intelligence to photos and searches, apply new privacy controls to protect user information, and much more! Continue reading for a […]
Read More