Knowledge Centre

Can you set up a Cisco Spark Board in 15 minutes?

Cisco says it takes only 15 minutes to deploy a Spark Board, so we set our team to the challenge.

The Wolf Short Film Series
The Wolf Short Film Series: The hacker’s hunt for vulnerable printers

There are hundreds of thousands of business printers in the world, less than 2% of them are secure!1 This…

Cisco Ransomware Defence for Dummies
Cisco Ransomware Defence for Dummies

The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative…

The Trojan Horse to your security strategy

The Australian Cyber Security Council found that 90% of Australian organisations faced some form of successful or attempted cyber-attack during…

Three self-assessment tools for Office 365 and Azure that are often overlooked
Three self-assessment tools for Office 365 and Azure that are often overlooked

I often speak with customers who have existing Microsoft online tenancies, configuration, resources and security controls that have been configured…

Anatomy of an Attack - Cisco - Cybersecurity
Anatomy of an Attack

See how an effective ransomware attack comes together. This is why today’s enterprises require effective security. To understand how…

Cisco Ransomware Quick Prevention Bundle
Cisco Ransomware Quick Prevention Bundle

The Cisco Ransomware Quick Prevention Bundle is a proven solution to help you rapidly protect your business. It works by…

The Single Most Important Consideration for any Cybersecurity Plan
The Single Most Important Consideration for any Cybersecurity Plan

How would you describe your organisation’s level of cybersecurity maturity or readiness? Do you have a cybersecurity strategy? Does your…

Convincing the Board to stay one step ahead of cybersecurity

When senior management teams and boards review cybersecurity in their organisations today, what do they see? Do they see the…

Go Beyond the Hype

Technology continues to disrupt and transform industries across the world. The constant sea of technology hype makes it increasingly difficult…

Why the impacts of cybersecurity breaches can be wide-reaching

Each year, Cisco publishes an industry benchmark, the Cisco Annual Cybersecurity Report. The yearly publication analyses advances in the security…

Guest Blog | A Show of (Brute) Force: Crysis Ransomware Found Targeting Australian and New Zealand Businesses – Trend Micro

Crysis (detected by Trend Micro as RANSOM_CRYSIS.A), a ransomware family first detected in February 2016, has been spotted targeting businesses…