Christopher McNaughton

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear sales and an uptick in…

5 months ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might already have been hacked in…

3 years ago

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68% of employees will steal information…

4 years ago

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee, there are many aspects to…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to hear, but the situation is…

4 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was engaged to conduct a security…

4 years ago

Office 365 Under Increased Attack

The recent increase in employees working remotely, combined with the migration to platforms such as Microsoft Office 365, has seen…

4 years ago

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

4 years ago

Application Patching – Information Security Essentials

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

4 years ago

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…

4 years ago