In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security…
21st June, 2022
8min
Read 5 min
Log4J Critical Vulnerability Advice
TLDR: A critical vulnerability has been identified in the popular Java logging library, Apache Log4j2. This threat has a CVSS…
17th December, 2021
5min
Read 11 min
Essential Eight Maturity Model: User Application Hardening
On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents…
1st December, 2021
11min
Read 2 min
Data#3 Partners with SecurityHQ to Expand its Managed Security Services
November 15, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has partnered with…
15th November, 2021
2min
Read 10 min
Essential Eight Maturity Model: Configure Microsoft Office Macro Settings
On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents Maturity…
2nd November, 2021
10min
Read 10 min
Pull your socks up and get a SOC
By Information Assurance Specialist at Data#3 Limited Your Business Needs A Managed Security Operations Centre (SOC) Investing in high-quality socks…
26th October, 2021
10min
Read 6 min
To SIEM or Not To SIEM
By Information Assurance Specialist at Data#3 Limited What is SIEM? The sheer amount of information generated on…