EWOTEE Ep 5: Patching Apps & Operating Systems
Patch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means. What are patches? Patches are fixes in software […]
Why your business needs a Password Manager
Trying to remember your password for every website, portal, tool and piece of software is borderline impossible. Some organisations like to solve this problem by using a very simple and memorable password, variations of the same password, or worse – the exact same password for everything! That’s just asking for trouble. Simple and memorable passwords […]
EWOTEE Ep 4: User Application Hardening
User Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]
EWOTEE Ep 3: Application Control
Hi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]
EWOTEE Ep 2: Restricting Admin Privileges
Hi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]
EWOTEE Ep 1: Essential Eight & Maturity Model Explained
Hello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]
You’re vaccinated, but is your technology?
As the world begins to open up and return to some semblance of normality, businesses are now in a debate over how to proceed with the return of staff into offices. Over the last 1.5 years, remote desktop access and cloud technology allowed employees to work from the safety of their own homes, but how […]
Apple September 2021 Keynote – What’s New?
In Apple’s September 2021 Keynote ‘California streaming’, the tech giant’s CEO Tim Cook unveiled Apple’s latest product range. The announcement was headlined by the new iteration of the iPhone, and was followed by an introduction of the latest iPads and Apple watches. Read on for a quick recap of Apple’s biggest announcements. iPhone 13 The […]
Should you backup Microsoft 365?
Are Microsoft 365 backups necessary? With benefits like easy access to files, emails, and documents, plus improved collaboration across teams, it’s no surprise that Microsoft 365 is an essential tool for most businesses across the globe. But what happens when your Microsoft 365 data is lost? Downtime as a result of lost or corrupt data […]
Chromebooks vs iPads in the Classroom
As the demand for technology increases in classrooms, the Chromebook vs iPad debate has been an ongoing discussion for schools and parents seeking to make the best technological choices for the development of their students and children. Chromebooks and iPads are currently the forerunners when it comes to portable devices in the classrooms, and […]