Threatlocker Enables the Essential Eight

Our application whitelisting and ringfencing technology has been growing by leaps and bounds lately, and we have been seeing adoption of this approach to security in Australia as well. We thought it was worth the effort to do a quick breakdown on how ThreatLocker can enable this critical strategy for Australian Businesses.

Read more

Anti-Vaxxing and Cyber Security

I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.

Read more

A Simple Remedy for the Ransomware Epidemic.

Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.

Read more

Control Access – Don’t Block Storage Devices

Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]

Read more

Endpoint Security Needs to Change

Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy.

Read more

Less Hackable – For Small Business Owners

After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: “How can I make myself unhackable?” Seldom do they understand when I try to explain that there is no such thing as unhackable. The purpose of this guide is to help business owners better understand cyber risks and […]

Read more

Are Macs more secure than Windows?

In the last 12 months, we have seen a growing number of people citing that Apple computers are more secure than Windows computers. We have also seen an increasing number of Macintosh computers with viruses. We often hear that Macintosh computers are secure and cannot be hacked.

Read more

The Human Element of Cyber Security

Businesses spend billions of dollars every year on cyber security products. firewalls, antivirus, IDS, dual factor authentication, Web and e-mail security are just some of the areas that billions of dollars are poured. Despite the enormous amounts of money and resources that are spent on cyber security, businesses are still hacked and infected with various […]

Read more