Latest Blog.
Trust no one, assume the worst and prepare for anything: Zero Trust explainer
|They say trust is the foundation of every good relationship. And in many ways it’s also true in the world of cyber security. You’re hardly going to give someone access to your network if you don’t trust them to do the right thing. In years g...
Leveraging Microsoft Azure for Enhanced Cyber Security
|In today’s tech-driven world, cloud computing has become an indispensable part of almost any business. Among the myriad of cloud platforms available, Microsoft Azure stands out as an exceptional choice, especially if you’re keen on adopting Infra...
How to protect your business from ransomware attacks: Part 2
|Before you read this article, we recommend checking out part one in the series – How to protect your business from ransomware attacks. Or, if you’d like the highlights: Ransomware attacks are on the rise. It’s time for all businesses, large...
How to protect your business from ransomware attacks: Part 1
|Up until a few years ago, the word “ransom” probably brought to mind images of old-fashioned kidnappers who leave behind notes demanding suitcases full of unmarked currency – “and don’t even think about calling the police!”. However, in 2...
What is the role of Security Operations Centres (SOCs) in cyber security?
|The cyber landscape has become a noisy place and is at the forefront of news. Every week we hear about a new major cyber-attack or security threat to citizen data. And those are just the ones that are visible. Meanwhile, millions of cyber events a...
How can military strategy help to improve your cyber security posture?
|Cyberspace has become a battleground – as the Australian Cyber Security Centre (ACSC) warned us in its most recent Cyber Threat Report. If you’re not already thinking like a military strategist to help improve your cyber security posture, now is ...
Graduate pathway careers that extend beyond borders
|“Ten years is a long time to spend in one job.” This year marks a decade since I joined the Macquarie Cloud Services (MCS) family, so I’ve been hearing that sentence a lot recently. While many people around my age tend to change jobs every t...
How to keep up-to-date with cyber security (without suffering information overload)
|Let’s face it: it’s really, really hard to stay up-to-date with everything cyber security. Why? Because there is so much going on, and the threat landscape changes every day. The past three years have been a game changer for the global cyber s...
What is the easiest way to prevent cyber security breaches?
|Cyber security breaches are the new battleground for Australian businesses. Not only are we seeing an increase in the number of cyber security attacks and breaches (76,000 were reported to the Australian Cyber Security Centre in 2021-2022, to be exac...
Why you can't just set and forget your Azure environment
|An old boss of mine once told me to adopt a ‘growth’ mindset. At the time, I was far too young, immature and inexperienced to fully grasp the notion but essentially, he was telling me “Look for opportunities to improve. Always.” My recent att...