by Gina Rosenthal | Nov 12, 2019 | Melissa Palmer, Security
Apple computers have steadily become more prevalent in the enterprise over the years. Love them or hate them, Macs are here to stay in your organization’s IT environment. Whether they are there due to business requirements, the rise of BYOD, or to just provide...
by Theresa Miller | May 14, 2019 | Adam Fowler, Platforms, Security, Strategy
Cyber Security Essential Eight and Microsoft Part 1 here. Continuing on from Part 1, here’s the second half of the Australian Government’s “Essential Eight” recommendations in mitigating Cyber Security Attacks, and where Microsoft fits into meeting them....
by Theresa Miller | Apr 16, 2019 | Adam Fowler, Security
The Australian Government has promoted its “Essential Eight” recommendations in mitigating Cyber Security Attacks for quite some time. These recommendations are quite solid, and worth reviewing for any organization. Let’s have a look at the first...
by Theresa Miller | Sep 20, 2018 | Adam Fowler, Microsoft Technology, Security
Multi-factor authentication (MFA) and the eventual abandoning of password based authentication is just around the corner. Of course MFA is available on many services right now, but saying goodbye to passwords is still a work in progress. The state of MFA with...
by Gina Rosenthal | Jul 12, 2018 | Melissa Palmer, Security
For as long as many of us can remember we have been starting our World Wide Web journeys by typing http://. If you have not already noticed, many sites now require https:// to access them. As a refresher, recall that HTTP actually stands for hyper text transfer...
by Gina Rosenthal | Apr 10, 2018 | Melissa Palmer, Security, Virtualization
Ransomware is no joke. Even those organizations who think their environments are up to date with patches and procedures have found themselves in a precarious position over the last few years. The simplest way to protect virtual machines against ransomware is to back...