fbpx

Managed Security Services

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

Delivering-the-Digital-Future-Securely
Delivering the Digital Future, Securely

Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could…

ACSC Essential Eight Maturity Model: Regular Backups
Essential Eight Maturity Model: Regular Backups

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

ACSC Essential Eight Maturity Model: Multi-Factor Authentication
Essential Eight Maturity Model: Multi-Factor Authentication

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

ACSC Essential Eight Maturity Model: Patch Operating Systems
Essential Eight Maturity Model: Patch Operating Systems

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

ACSC Essential Eight Maturity Model: Restrict Admin Privileges
Essential Eight Maturity Model: Restrict Administrative Privileges

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security…

Log4J Critical Vulnerability Advice

TLDR: A critical vulnerability has been identified in the popular Java logging library, Apache Log4j2. This threat has a CVSS…

Essential-Eight-Maturity-Model-User-Application-Hardening
Essential Eight Maturity Model: User Application Hardening

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents…

SOC, Data#3, Managed Security Services
Data#3 Partners with SecurityHQ to Expand its Managed Security Services

November 15, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has partnered with…

Essential-8-Maturity-Model-Microsoft-Office-Macros-Blog
Essential Eight Maturity Model: Configure Microsoft Office Macro Settings

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents Maturity…

SOC - Security operations center
Pull your socks up and get a SOC

By Information Assurance Specialist at Data#3 Limited Your Business Needs A Managed Security Operations Centre (SOC) Investing in high-quality socks…

To-SIEM-or-not-to-SIEM
To SIEM or Not To SIEM

By Information Assurance Specialist at Data#3 Limited What is SIEM? The sheer amount of information generated on…

Essential-Eight-Maturity-Model-Patch-Applications
Essential Eight Maturity Model: Patch Applications

By Information Assurance Specialist at Data#3 Limited On July 12, 2021, the Australian Cyber Security Centre (ACSC)…

ACSC-Essential-Eight-Maturity-Model
Your guide to the ACSC’s Essential Eight Maturity Model Updates

By Information Assurance Specialist at Data#3 Limited It’s hard to argue against my passion for cybersecurity and by extension, how…

What is the role of partners in a aaS world
What is the role of partners in a vendor-driven ‘as a Service world?

Digitalisation has changed gear and the shift to Everything as a Service has revised not just the way businesses think…