Christopher McNaughton

Christopher McNaughton

Understanding the Australian economy through the lens of underwear and lipstick salesUnderstanding the Australian economy through the lens of underwear and lipstick sales

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear sales and an uptick in…

2 years ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might already have been hacked in…

4 years ago
INFORMATION THEFT – THE EMPLOYEE RISKINFORMATION THEFT – THE EMPLOYEE RISK

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68% of employees will steal information…

5 years ago
Don’t Become a Victim of Cyber CrimeDon’t Become a Victim of Cyber Crime

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…

5 years ago
YOUR COMPANY HAS BEEN BREACHED!YOUR COMPANY HAS BEEN BREACHED!

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…

5 years ago
CASE STUDY – OFFICE 365 BREACHCASE STUDY – OFFICE 365 BREACH

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was engaged to conduct a security…

5 years ago
Office 365 Under Increased AttackOffice 365 Under Increased Attack

Office 365 Under Increased Attack

The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…

5 years ago
LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITYLARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

5 years ago
Application Patching – Information Security EssentialsApplication Patching – Information Security Essentials

Application Patching – Information Security Essentials

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

5 years ago
Configuring Macro Settings – Information Security EssentialsConfiguring Macro Settings – Information Security Essentials

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…

5 years ago