fbpx

Cybersecurity

The Southport School Revisited
The Southport School: Four Years On

How have their investments in wireless networking and security paid off after four years? Download Customer…

Palo Alto Security Growth Partner of the Year
Data#3 Triumphs with Palo Alto Networks Security Award

November 11, 2022; Sydney, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Delivering-the-Digital-Future-Securely
Delivering the Digital Future, Securely

Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could…

ACSC Essential Eight Maturity Model: Regular Backups
Essential Eight Maturity Model: Regular Backups

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Data#3 Named Global Cisco Security Partner of the Year
Data#3 Accomplishes Five Year Winning Streak – Named 2022 Global Security Leader

November 02, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Blog - Network Visibility and Authentication
Network visibility and authentication: Your school’s cyber security superpowers

When it comes to cyber security, schools need to be as vigilant as any business. After all, they deal with…

ACSC Essential Eight Maturity Model: Multi-Factor Authentication
Essential Eight Maturity Model: Multi-Factor Authentication

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Why has identity management for the hybrid workforce become so difficult?

We all know the story of the mad scramble organisations faced in shifting from a primarily office-driven workforce to…

ACSC Essential Eight Maturity Model: Patch Operating Systems
Essential Eight Maturity Model: Patch Operating Systems

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Webinar: Behind every breach is a known flaw
Behind every breach is a known flaw

Data#3 and Tenable are pleased to present: Behind every breach is a known flaw. With…

BTC Markets Case Study
Customer Story: BTC Markets

BTC Markets Enables Growth and Boosts Security with Cisco Solution from Data#3 Download Customer Story…

What you need to know about protecting your Microsoft 365 data

Nearly one-third of all business-critical data resides in SaaS applications today. One of the most widely used…

Cyber Supply Chain Security: The New Trojan Horse for your Data Centre

TL;DR Cyberattacks to businesses via IT Supply Chains are increasing at 42% Quarter on Quarter (QOQ) Q420-Q121. Lenovo’s industry-recognised supply…

Healthcare Imprivata Data#3 Australia
Imprivata Hosts International iPartner Awards to Celebrate Exceptional Performance and Growth

Source: Extract below. See full story on the Imprivata website here. London, England– February 17, 2022—…

School Education Cybersecurity Exam
Would your school pass or fail the cybersecurity exam?

Lessons learned from the K-12 Education sector Since early 2020, Australian schools have demonstrated remarkable adaptability and innovation, but they…

Security, Trend Micro
Data#3 Named Trend Micro Security Partner of the Year

November 19, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

SOC, Data#3, Managed Security Services
Data#3 Partners with SecurityHQ to Expand its Managed Security Services

November 15, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has partnered with…

Essential 8 Security Webinar
Improve your school’s Essential 8 maturity with Data#3 and Microsoft

Many organisations struggle with their cybersecurity posture. Some have managed to arrive at a state of awareness, but very few…

Customer Story: A Cisco Firepower Case Study

Cisco Firepower Strengthens Organisational Cybersecurity Defences Objective As a large organisation that places a high priority on IT security to…

Video: Cyber Maturity in Education Part 2
Cyber Maturity in Education Part 2

Watch part 1 here > Practical steps to improve your School’s Security Posture Outlining…

Video: Cyber Maturity in Education Part 1
Cyber Maturity in Education Part 1

Practical steps to improve your school’s security posture Outlining common cybersecurity gaps in school environments and how you can take…

Data#3 Innovation Fund Set to Fortify Digital Transformation in WA Government Sector

June 21, 2021; Perth, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has launched Project…

Cisco Telemetry Broker and Cisco SecureX
Cisco Telemetry Broker and Cisco SecureX – The Future of Security Analytics
juiceit_cybersecurity
Modern Cybersecurity: Responding in the Age of Response

Most of us have long since given up flipping through our daily newspapers, favouring 24/7/365 news available at our…

Data#3 Presents Roundup on What Lies Ahead: the Future in Focus

January 4, 2021: Brisbane, Australia: For numerous reasons, 2020 will be a year that few are reluctant to farewell. On…

News----Data#3-Scores-Palo-Alto-Growth-Partner-of-the-Year
Data#3 Secures Palo Alto Growth Partner of the Year

Leading Australian technology services and solutions provider, Data#3, today announced that it has been named the Palo…

Microsoft 365 E5 – Have your cake and eat it too.

The phrase “You can’t have your cake and eat it too” is an English proverb that’s been a popular saying…

Blog-Q&A-Group-Security-Practice
Q&A with the Data#3 Group Security Practice

The Data#3 group Security practice spans a national team of experienced individuals with decades of combined…

Taking the Work out of the School Network

While there’s no consensus on who coined the phrase ‘truth is stranger than fiction’, you’d be hard pressed to find…

Is your collaboration platform compromising your security?

The rapid and large-scale shift to remote working across many industries has raised new questions around the security of…

5 Steps to Implement DevSecOps

The 1980s gave us many good things, such as U2, Metallica and Bon Jovi (questionable). But from a security…

VMware and Carbon Black: An Advance for Cloud Endpoint Protection

Initially, analysts were surprised when VMware completed its $2.1 billion cash purchase of Carbon Black in August…

Predict and Prevent with Splunk ITSI: 6 Customer Stories

Too many alerts, too little time In Asia Pacific 69%1 of companies receive more than 5,000 threats a day –…

Big Security in a Small Business World:
10 myth busters for SMB cybersecurity

Several myths exist around how seriously SMBs take cybersecurity. This recently released Cisco report, “Big Security in…

JuiceIT Digital 2020 Digest | Edition 4

The 5 Things that Remain Unchanged for IT Leaders Post-COVID Jean-Baptiste Alphonse Karr wrote in 1849, ‘plus ça change, plus…

JuiceIT Digital 2020 Digest | Edition 3

Out of the Shadows: Getting Clarity with Your Post-COVID IT Landscape Imagine trying to establish strong security in your home,…

JuiceIT Digital 2020 Digest | Edition 2

Letting Go of Normal: Your Post-COVID Survival Guide Over the last few months, many homebound Australians have been taking stock.

JuiceIT Digital 2020 Digest | Edition 1

Business as Unusual: The Organisations That Will Emerge Strongest from 2020 When the bushfires that incinerated over 10 million hectares1…

The Future Asset Management Considerations for COVID-19

In our last blog, we took a look at the current state of asset management as organisations rapidly implement strategies…

The Here and Now of Asset Management Considerations for COVID-19

As more and more organisations are rapidly moving their workforce to work from home (“WFH”) on a large scale,…

Data#3 launches work from home solutions for customers in response to COVID-19

March 25, 2020; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has launched its…

Customer Story: St Mary’s College

St Mary’s College Safeguards Staff and Students with Next-Generation Firewall Solution Objective As one of Tasmania’s most respected educators, St…

Hobart’s St Mary’s College Safeguards Staff and Students with Next-Generation Cybersecurity Solution from Data#3

March 19, 2020; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has worked with…

The Digital Transformation Keeping WA Ahead

If Australia is truly the lucky country, then surely WA must be the most fortunate of all. From unspoilt beaches…

Symantec Cloud Security Threat Report 2019

Adapting to the New Reality of Evolving Cloud Threats Today’s fast growing hybrid IT environment challenges the basic principles of…

Mobile Cybersecurity
Protecting GenMobile: the need for adaptive trust in cybersecurity

For better or worse we are all dependant on our mobile devices these days. This is especially true for the…

Gone Phishin’ – What to do if you suspect an attack

Recently, I have had many conversations with connections in several industries that have encountered a recent run of phishing emails.

Workplace Cybersafety: the 10 Tips that Will Make Everyone Safer at Work and Online
Workplace Cybersafety: the 10 Tips that Will Make Everyone Safer at Work and Online

If you asked most workers, who is responsible for cybersecurity, they’d point you towards the IT department. While they would…

Finding cybersecurity equilibrium in the midst of a skills shortage

When building or retaining your cybersecurity teams, if you haven’t yet felt the symptoms of the cyber “skills shortage”…

Modern Desktop Management
Modern Desktop Management – Shift your Mindset, Not the Workload

Recently I was involved in a discussion in a Facebook group that asked the question “How do you find Intune…

Customer Story: Logistics Agency

Logistics company delivers with new security solution Company Overview Like many organisations, the customer had a complex environment featuring many…

Symantec 2018 Security Report
Symantec 2018 Internet Security Threat Report – Review

The Symantec brand is synonymous with cybersecurity. Each year, the Symantec Internet Security Threat Report sets a benchmark…

Data#3 Security in Education
Security in Education | Expert Panel Discussion

Data#3 invited a panel of industry experts to discuss the evolving security requirements for education institutions, including the recently introduced…

Preparing for the Notifiable Data Breaches Scheme - Data#3
Preparing For The Notifiable Data Breaches Scheme

Source publication: ARN – Click to view on source website Information Assurance in Australia has always been important to…

The state of cybersecurity – Where do we go from here?

Nobody wants to be “that” IT person who thinks their organisation is secure, but then out of nowhere, a cyberattack…

ASD Essential Eight Explained
The ASD Essential Eight Explained – eBook

The Evolving Cybersecurity Threat The last few decades have seen dramatic changes in the world of business. Today, organisations generate…

The importance of creating a culture of security awareness

What Is It? The users of your information systems are the key to your organisation’s success. These are the people…

Security considerations of The Anywhere Workplace

What Is It?  How many of us have attempted to start our computer in the morning only to have…

Management Networks - Blog
Are Management Networks worth the hassle?

What Is It? Management Networks can be seen as a continuation of Network Segmentation, as they can yield significant benefits…

JuiceIT - Trend Micro
Paradigm Shifts – How can you prepare for the year ahead?

JuiceIT Sponsored Blog Remember the days when the extent of a cyberattack was defacing a website for fun,…

Cyberattacked Disaster Recovery
Facing the threat of cyberattacks: how does your disaster recovery solution stack up?

It’s a message every IT manager dreads. ‘Your personal files are encrypted by CTB-Locker. To decrypt the files, you need…

Data#3 and Tenable
Data#3 and Tenable Collaborate to Deliver Enhanced Cybersecurity Services to Customers

March 21, 2018; Brisbane, Australia: Leading Australian information technology provider, Data#3, today announced it has signed a partner agreement with…

Cisco Umbrella: Security beyond the firewall

What attacks aren’t you seeing? What’s your organisation doing to block the threat of a breach? Are you still relying…

Intent-based networking built on Cisco DNA

In this new video from Cisco, a well known actor paints a picture of the new world, and introduces an…

Cisco Umbrella
Cisco Umbrella – a quick win in IT Security

One of the most challenging hurdles to implementing new security infrastructure in any organisation is integrating it into your existing…

ASD Essential Eight Explained – Part 8: Daily Backups

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 7: Multi-Factor Authentication

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 6: Using Application Hardening

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 5: Disabling Untrusted Microsoft Office Macros

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 4: Patching Operating Systems

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 3: Restricting Administrative Privileges

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 2: Patching Applications

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 1: Application Whitelisting

The Essential Eight In February of 2017, The Australian Signals Directorate (ASD) published an update to their “Top 4” Strategies…

What is your Cybersecurity Strategy?

Quick question: What presently is your organisation’s Cybersecurity Strategy? Difficult to answer, isn’t it? It causes stakeholders to pause for…

Cisco Ransomware Defence for Dummies
Cisco Ransomware Defence for Dummies

The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative…

Anatomy of an Attack - Cisco - Cybersecurity
Anatomy of an Attack

See how an effective ransomware attack comes together. This is why today’s enterprises require effective security. To understand how…

Cisco Ransomware Quick Prevention Bundle
Cisco Ransomware Quick Prevention Bundle

The Cisco Ransomware Quick Prevention Bundle is a proven solution to help you rapidly protect your business. It works by…

The Single Most Important Consideration for any Cybersecurity Plan
The Single Most Important Consideration for any Cybersecurity Plan

How would you describe your organisation’s level of cybersecurity maturity or readiness? Do you have a cybersecurity strategy? Does…

Security concerns about multi-user terminals in healthcare need no longer apply

The promise of the digitisation of patient health records and interlinkage of imaging, results and clinical information systems has long…

Convincing the Board to stay one step ahead of cybersecurity

When senior management teams and boards review cybersecurity in their organisations today, what do they see? Do they see the…

Why the impacts of cybersecurity breaches can be wide-reaching

Each year, Cisco publishes an industry benchmark, the Cisco Annual Cybersecurity Report. The yearly publication analyses advances in the…

ASD Essential Eight Strategy
Do you have an ASD Essential 8 (E8) strategy?

In February of 2017, The Australian Signals Directorate revised their long-standing go-to list of strategies to mitigate cyber security…

THE NEW IT SECURITY PARADIGM PART 4 – VMware’s NSX, and its Promise of a New Standard

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] Over my last 3…

THE NEW IT SECURITY PARADIGM PART 3 – Network Virtualisation & Encryption

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] The problem with encryption…

THE NEW IT SECURITY PARADIGM PART 2 – How Network Virtualisation Will Transform IT Security

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 3 minutes] Neighbourhood Watch When thinking of…

THE NEW IT SECURITY PARADIGM PART 1 – The Need for A New Security Perspective

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 4 minutes] Can you…

Ransomware: Plug the gaps in your defence strategy

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] Dealing with ransomware is becoming increasingly…

Will 2016 be the year IT Departments stand firm against cybersecurity threats?

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] The title of this article…

Should cybersecurity education be mandatory for staff?

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] It’s obvious that cybersecurity…

How to tackle human threat through identity management

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] I recently came across…