PhishNet

Uncategorized

5 Steps for Making your Mobile Devices More Secure

Do your employees receive work calls, texts, or emails on mobile devices? Do you have strategies in place to minimise the security gaps this can create? As businesses, we’re online more than ever before. So are our employees. It’s a great opportunity to provide better service to customers. But there’s a dark side, too. Blurred …

5 Steps for Making your Mobile Devices More Secure Read More »

2023 Data Breaches: Insights and Lessons for Strengthening your Defences

Data breaches have been big news in 2023 to date. We’ve seen a lot of them – and we’re only halfway through the year!   Cyber crime is ramping up. Ransomware as a service is very lucrative. Criminals looking for data to sell hire groups who already have all the infrastructure in place to run …

2023 Data Breaches: Insights and Lessons for Strengthening your Defences Read More »

Safeguarding Sensitive Data: The Power of Clean Desk Policies

Clean desk policies may appear excessive, but our work desks are extensions of ourselves and we like to add some personal touches to them! The problem occurs when your organisation loses control of its data. A password on a sticky note stuck to a monitor. A business plan mentioned where non-employees can hear. Customer data …

Safeguarding Sensitive Data: The Power of Clean Desk Policies Read More »

How to Promote a Culture of Cyber Resilience

In our latest blog post we take a look at the Australian Institute of Company Directors and the Cybersecurity Cooperative Research Centre’s Cybersecurity Governance Principle 4  : promote a culture of cyber resilience. Firstly, what is cyber resilience? It’s when an organisation can: Respond quickly to incidents. Continue functioning during ongoing attacks. Block secondary access attacks during …

How to Promote a Culture of Cyber Resilience Read More »

Importance of Embedding Cybersecurity Into Risk Management

We’re continuing our series of blog posts about the Australian Institute of Company Directors and the Cyber Security Cooperative Research Centre’s Cybersecurity Governance Principles. These principles help to guide boards in leading cyber strategy. Today’s blog post is all about principle 3: embed cybersecurity in existing risk management practices. Cyber strategy involves risk. You can’t …

Importance of Embedding Cybersecurity Into Risk Management Read More »

Cyber Security Principles : Develop, Implement and Evolve a Comprehensive Cyber Strategy

Running a business without a cyber incident strategy is like riding a bike without a helmet. Sure you can probably go pretty far with no worries. But when you do run into trouble, the lack of a cyber strategy  is going to cause you extra problems. Suddenly your life – or your business – is …

Cyber Security Principles : Develop, Implement and Evolve a Comprehensive Cyber Strategy Read More »