Understanding the Australian economy through the lens of underwear and lipstick salesUnderstanding the Australian economy through the lens of underwear and lipstick sales

Understanding the Australian economy through the lens of underwear and lipstick sales

2 years ago
Christopher McNaughton

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear sales and an uptick in…

New fraud costing Australian business millions annually

4 years ago

  If you work in the Finance Department of your company your email account might already have been hacked in…

INFORMATION THEFT – THE EMPLOYEE RISKINFORMATION THEFT – THE EMPLOYEE RISK

INFORMATION THEFT – THE EMPLOYEE RISK

5 years ago

  Information Theft - What is the Risk? Our research has shown that around 68% of employees will steal information…

Don’t Become a Victim of Cyber CrimeDon’t Become a Victim of Cyber Crime

Don’t Become a Victim of Cyber Crime

5 years ago

  The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…

YOUR COMPANY HAS BEEN BREACHED!YOUR COMPANY HAS BEEN BREACHED!

YOUR COMPANY HAS BEEN BREACHED!

5 years ago

The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…

CASE STUDY – OFFICE 365 BREACHCASE STUDY – OFFICE 365 BREACH

CASE STUDY – OFFICE 365 BREACH

5 years ago

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was engaged to conduct a security…

Office 365 Under Increased AttackOffice 365 Under Increased Attack

Office 365 Under Increased Attack

5 years ago

The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITYLARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

5 years ago

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

Application Patching – Information Security EssentialsApplication Patching – Information Security Essentials

Application Patching – Information Security Essentials

5 years ago

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

Configuring Macro Settings – Information Security EssentialsConfiguring Macro Settings – Information Security Essentials

Configuring Macro Settings – Information Security Essentials

5 years ago

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…