Blog​

Modern Password Complexity Management with Password Logic

The evolving threat landscape In the past, the perimeter network was considered the largest attack surface for organisations. Well-configured firewalls used to sufficiently secure a network, and threat actors would spend their time sending empty handshakes to every port in…

Top Level Domain Threat

Top Level Domain Threat. What is it and how does it affect you and your business? It is commonly known that domains end in “.com” or “.com.au”. These are called Top Level Domains (TLDs). As the number of available names…

What is network security, network security design, and what’s involved?

Most businesses and management teams find themselves asking questions about network security at one point. Questions like, what is network security? What is network design? What is network security design? What is involved in these? And, do I need network…

How to keep your identity safe online

Every year millions of people fall victim to data breaches and identity theft and, chances are, you are one of them. Earlier this year, the private and personal information of more than 1.5 billion Facebook users was listed for sale…

Why you should use a password manager to protect your digital data

Nobody likes passwords but they’re a fact of life. While some tech companies have tried to kill them off with fingerprints and face-scanning technology, neither are perfect and many still resort back to the trusty (but frustrating) password. Most humans…

Why computer naming conventions are important

By Aaron Van Moorsel, Envisage Technology When you buy a new PC for your home, it probably arrives with a device name in the background like: L178HY6783. You will probably never need this device name, and therefore it has little…

Government’s cyber-security strategy is welcome but business owners still need to take responsibility for their own security

Key takeaways Australia’s Cyber-Security Strategy 2020 is a broad plan by the Federal Government to protect the nation from cyber-criminals but business owners ultimately need to take responsibility for their own cyber-security. Experts say cyber incidents targeting small, medium and…

Poor email security can leave you vulnerable to cyber attacks

Key takeaways Emails are the most versatile of all online business tools we can access from our computers, through the web and on our mobile devices. But that also makes it one of the most at-risk tools and highly susceptible…