Articles
The art of deception: How honeypots strengthen network defences
Detecting cyber criminals within a complex network can be difficult. Internal threats that have breached the perimeter can operate under the radar for extended periods. Once inside, attackers may…
What are your technical security assessment options?
A penetration test can be a great way to identify security vulnerabilities or misconfigurations on an organisations network through a controlled cyberattack simulation, where security experts act…
The rise of shadow cloud and shadow AI: growing data exposure risks from unmanaged AI tools
In recent months, organisations across industries have seen a sharp increase in employees using unmanaged AI tools and unsanctioned cloud services to support day‑to‑day tasks. This trend, often…
SharePoint Server 2016 & 2019 End of Support: what it really means (and what to do next)
Over the next 12–18 months, we’ll see organisations caught out by the approaching end of support for SharePoint Server 2016 & 2019. It’s not always front-of-mind because…
Securing AI adoption without slowing innovation
Over the past year, one theme has come through clearly across our client work: employees are adopting AI and cloud tools faster than organisational governance can keep up.
Major identity risk facing Australian universities
The greatest cybersecurity threat facing Australian universities right now isn’t ransomware or system failures, but identity compromise - the unauthorised use of legitimate…
From ‘AI Working Group’ to an AI working group that works
AI working groups are emerging across organisations, government bodies, universities, and community settings. It’s a positive shift and reflects a growing recognition that AI is no longer…
Why Unified Communications and modern telephony matter more than ever
For many organisations, telephony and communications have quietly become one of the biggest barriers to productivity, flexibility and growth. Legacy phone systems, disconnected tools and ageing…