Category: Blog

What is the Office 365 Security & Compliance Centre?

  • Published on March 26, 2019
  • No comments

Believe it or not, Office 365 now contains 27 separate apps that are provided by Microsoft.   Many of these apps are provided with advanced security features.  Clearly managing these security features within each admin tool is a complex and onerous task.  So Microsoft have moved as much security as possible into the Office 365 Security […]

Cybersecurity as Code in Office 365

  • Published on April 9, 2018
  • No comments

Last week I was running a course in Auckland, where I demonstrated the Office 365 Security & Compliance Center. The great thing about this new tool, is that it is policy-based, interactive and extremely visual. What does that really mean?  You need to firstly determine the important information around your corporate security posture. Then you […]

Risk Management Using The Right Approach

  • Published on February 5, 2018
  • No comments

It was just last year that the Ponemon Institute and IBM announced startling global data breach statistics. According to the organisations, in the Cost of Data Breach Study: Global Analysis study, the average cost of a data breach grew 23 per cent from the same report in 2013. The COBIT 5 framework has long been seen […]

How Well Do You Know Cybersecurity?

  • Published on December 19, 2017
  • No comments

Cybersecurity. It can be an intimidating prospect to get your head around, especially when IT isn’t in your job description. However, digital infrastructure has quickly become the dominant foundation upon which businesses are operating. While the digital sphere offers countless advantages and opportunities, it also brings with it a new threats.

3 reasons why your IT department is not delivering true business value

  • Published on February 26, 2017
  • No comments

Is your organisation getting full business value from its IT department? Here are three common mistakes that many companies are making.

The Realistic TOR Hack of Mr. Robot

  • Published on July 22, 2016
  • No comments

With the second season of Mr. Robot recently released for TV on demand, we’re taking a look at one of the controversial hacks performed on the show. 

Government hacks highlight international security concerns

  • Published on June 24, 2016
  • No comments

Recent hacks have shown the value and vulnerabilities associated with data breaches. How is choosing the right framework the first step in security?

Weaponising encryption through zero-day vulnerabilities

  • Published on June 23, 2016
  • No comments

An increase of crypto-ransomware figures show how cybercriminals are using zero-day vulnerabilities to exploit the weaknesses of a computer network. 

Hacking the amygdala with social engineering

  • Published on June 8, 2016
  • No comments

Hackers are using social engineering techniques to manipulate individuals out of sensitive information. Could kindness really be a security flaw? 

Mobile social engineering and the rise of ransomware

  • Published on June 5, 2016
  • No comments

The use of malware and infectious software by cybercriminals is decreasing, as hackers realise the potential of ransomware and social engineering techniques.