Latest Blog.
Foundational Considerations for Securing Your Azure Environment
|How to secure your Microsoft Azure environment At Macquarie Cloud Services, our appreciation for Microsoft Azure runs deep, driven by a multitude of compelling factors. Its capabilities provide a seamless and cost-effective pathway to the cloud, b...
Want a really good cyber security strategy? Skip to the end.
|If you’re finding it difficult to develop a consistent cyber security strategy, you’re not alone. The current landscape is a complex one – and that makes it hard for leaders to take a few big steps backwards to think strategically. Meanwhile...
Trust no one, assume the worst and prepare for anything: Zero Trust explainer
|They say trust is the foundation of every good relationship. And in many ways it’s also true in the world of cyber security. You’re hardly going to give someone access to your network if you don’t trust them to do the right thing. In years g...
Leveraging Microsoft Azure for Enhanced Cyber Security
|In today’s tech-driven world, cloud computing has become an indispensable part of almost any business. Among the myriad of cloud platforms available, Microsoft Azure stands out as an exceptional choice, especially if you’re keen on adopting Infra...
How to protect your business from ransomware attacks: Part 2
|Before you read this article, we recommend checking out part one in the series – How to protect your business from ransomware attacks. Or, if you’d like the highlights: Ransomware attacks are on the rise. It’s time for all businesses, large...
How to protect your business from ransomware attacks: Part 1
|Up until a few years ago, the word “ransom” probably brought to mind images of old-fashioned kidnappers who leave behind notes demanding suitcases full of unmarked currency – “and don’t even think about calling the police!”. However, in 2...
What is the role of Security Operations Centres (SOCs) in cyber security?
|The cyber landscape has become a noisy place and is at the forefront of news. Every week we hear about a new major cyber-attack or security threat to citizen data. And those are just the ones that are visible. Meanwhile, millions of cyber events a...
How can military strategy help to improve your cyber security posture?
|Cyberspace has become a battleground – as the Australian Cyber Security Centre (ACSC) warned us in its most recent Cyber Threat Report. If you’re not already thinking like a military strategist to help improve your cyber security posture, now is ...
Graduate pathway careers that extend beyond borders
|“Ten years is a long time to spend in one job.” This year marks a decade since I joined the Macquarie Cloud Services (MCS) family, so I’ve been hearing that sentence a lot recently. While many people around my age tend to change jobs every t...
How to keep up-to-date with cyber security (without suffering information overload)
|Let’s face it: it’s really, really hard to stay up-to-date with everything cyber security. Why? Because there is so much going on, and the threat landscape changes every day. The past three years have been a game changer for the global cyber s...