fbpx

Security

Streamline operations and empower employees in the modern workplace

One thing we can all agree on, is that the nature of work has changed.  Employees expect…

Customer Story: Main Roads Western Australia

Main Roads Western Australia Boosts Visibility and Security with Microsoft Defender for Identity Solution from Data#3…

Customer Story: Hydro Tasmania

Hydro Tasmania seamlessly transitions to work from home across Australia Download Customer Story…

Customer Story: ElectraNet

ElectraNet cuts costs and increases visibility with technology intelligence solution Download Customer Story…

ACSC Essential Eight Maturity Model: Patch Operating Systems
Essential Eight Maturity Model: Patch Operating Systems

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

ACSC Essential Eight Maturity Model: Restrict Admin Privileges
Essential Eight Maturity Model: Restrict Administrative Privileges

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security…

Webinar: Behind every breach is a known flaw
Behind every breach is a known flaw

Data#3 and Tenable are pleased to present: Behind every breach is a known flaw. With…

Customer Story: SeaRoad Holdings

SeaRoad Holdings chart a digital transformation course with HPE GreenLake Download Customer Story…

BTC Markets Case Study
Customer Story: BTC Markets

BTC Markets Enables Growth and Boosts Security with Cisco Solution from Data#3 Download Customer Story…

Vision Super Customer Story
Customer Story: Vision Super

Vision Super Achieves Cost Advantages with Data Centre Refresh from Data#3 Download Customer Story…

Dissecting Aruba ClearPass
Network Security Made Easy: Dissecting Aruba ClearPass

Let’s talk about ClearPass, the family of rock-solid network access control solutions from Aruba, a Hewlett Packard Enterprise company.

Customer Story: Credit Corporation (PNG)

Infrastructure Refresh Positions Credit Corporation for a Bright Future Download Customer Story Contact…

IOT is everywhere Blog
IoT is everywhere, use Aruba ClearPass to get on top of security risks

Take a moment to count how many connected devices you use your in home. Beyond smartphones and laptops, think voice-activated…

Cyber Supply Chain Security: The New Trojan Horse for your Data Centre

TL;DR Cyberattacks to businesses via IT Supply Chains are increasing at 42% Quarter on Quarter (QOQ) Q420-Q121. Lenovo’s industry-recognised supply…

AIC Students Using Microsoft Devices
Australian Islamic College transforms teaching, learning and IT management outcomes with Data#3 and Microsoft

February 24, 2022; Perth, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has worked with…

AIC Case Study
Customer Story: Australian Islamic College

Australian Islamic College transforms teaching, learning and IT management outcomes with Microsoft 365 Download Customer Story…

AIC Video
Australian Islamic College: A Microsoft Teams Collaboration Case Study

The Australian Islamic College embarked on a significant digital transformation journey to enhance collaboration, support online learning and digitalise core…

Integria Case Study
Integria Healthcare blooms after modernising its digital landscape

Source Publication: Microsoft News Center (Click to view on source website) For more than 70 years, Integria Healthcare (Integria)…

Westminster Schools Case Study
Data#3 upgrades Adelaide’s Westminster School’s IT systems with Dell EMC VxRail HCI

Author: Nico Arboleda, Journalist, CRN Australia Source Publication: CRN Australia (Click to view on source website) Managed services provider Data#3…

Customer Story: Fiona Stanley Hospital

Tap On, Tap Off: Fiona Stanley Hospital Aids Clinical Efficiency with Post-COVID Login Solution Download Customer…

Data#3’s top IT resources from 2021

Refresh your knowledge and kickstart your technology journey in 2022   For many organisations, 2021 presented both challenges and opportunities.

A day in the Life of a clinician with the Surface Go in-hand

In a healthcare setting, mobile devices – laptops, tablets and 2-in-1s – are becoming just as common as the thermometer.

Log4J Critical Vulnerability Advice

TLDR: A critical vulnerability has been identified in the popular Java logging library, Apache Log4j2. This threat has a CVSS…

School Education Cybersecurity Exam
Would your school pass or fail the cybersecurity exam?

Lessons learned from the K-12 Education sector Since early 2020, Australian schools have demonstrated remarkable adaptability and innovation, but they…

Essential-Eight-Maturity-Model-User-Application-Hardening
Essential Eight Maturity Model: User Application Hardening

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents…

Webinar: Data#3 and Cisco Present Ask the Expert: Cisco SASE
Data#3 and Cisco Present Ask the Expert: Cisco SASE

To provide secure, consistent access wherever users and applications reside, the enterprise needs to now treat each user as an…

Security, Trend Micro
Data#3 Named Trend Micro Security Partner of the Year

November 19, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

SOC, Data#3, Managed Security Services
Data#3 Partners with SecurityHQ to Expand its Managed Security Services

November 15, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has partnered with…

Essential-8-Maturity-Model-Microsoft-Office-Macros-Blog
Essential Eight Maturity Model: Configure Microsoft Office Macro Settings

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents Maturity…

Customer Story: Qenos

Digital Transformation at Qenos Delivers Substantial Business Efficiencies Project Objective Qenos sought a unified communications solution that would enable digital…

Webinar: Is your strategic roadmap setting you on the right path?
Is your strategic technology roadmap setting you on the right path?

High levels of uncertainty and rapid change of pace means that government entities alike are experiencing increased service delivery challenges.

SOC - Security operations center
Pull your socks up and get a SOC

By Information Assurance Specialist at Data#3 Limited Your Business Needs A Managed Security Operations Centre (SOC) Investing in high-quality socks…

To-SIEM-or-not-to-SIEM
To SIEM or Not To SIEM

By Information Assurance Specialist at Data#3 Limited What is SIEM? The sheer amount of information generated on…

HP Elite Dragonfly
The HP Elite Dragonfly G2 Has Arrived: Secure, Sustainable, and Spectacular

The old adage that good things come in small packages was never truer than in HP’s latest device offering –…

Essential-Eight-Maturity-Model-Patch-Applications
Essential Eight Maturity Model: Patch Applications

By Information Assurance Specialist at Data#3 Limited On July 12, 2021, the Australian Cyber Security Centre (ACSC)…

Essential 8 Security Webinar
Improve your school’s Essential 8 maturity with Data#3 and Microsoft

Many organisations struggle with their cybersecurity posture. Some have managed to arrive at a state of awareness, but very few…

Essential-Eight-Maturity-Model-Application-Control
Essential Eight Maturity Model: Application Control

By Information Assurance Specialist at Data#3 Limited As of July 12, 2021, the new Essential Eight maturity model became available…

ACSC-Essential-Eight-Maturity-Model
Your guide to the ACSC’s Essential Eight Maturity Model Updates

By Information Assurance Specialist at Data#3 Limited It’s hard to argue against my passion for cybersecurity and by extension, how…

Azure Cosmos Vulnerability
Vulnerability in Microsoft Azure Cosmos DB

TLDR: I recommend all customers using Cosmos DB rotate all connection keys for each instance of Cosmos DB immediately.  …

Citrix on Azure
Citrix on Azure: 4 things to know before moving from on-premises to the cloud

Over the last year, organisations around the world have had to rethink the workplace technology they provide to their people.

Remote Working on Citrix Azure
The security risks of remote working and how Citrix on Azure can help

We are living in a time of significant change when it comes to how and when we work. The events…

Email Security
Email: E for Error?

A number of years ago while on a family vacation, a younger member of the household that stayed behind was…

Customer Story: A Cisco Firepower Case Study

Cisco Firepower Strengthens Organisational Cybersecurity Defences Objective As a large organisation that places a high priority on IT security to…

Video: Cyber Maturity in Education Part 2
Cyber Maturity in Education Part 2

Watch part 1 here > Practical steps to improve your School’s Security Posture Outlining…

Video: Cyber Maturity in Education Part 1
Cyber Maturity in Education Part 1

Practical steps to improve your school’s security posture Outlining common cybersecurity gaps in school environments and how you can take…

Customer Story: IMDEX

IMDEX Transforms Mining Operations by Digging Deep Into Data Key Challenges IMDEX ’s teams needed a tool to manage exorbitant…

Teams-vs-Zoom-Blog-Card
Teams Vs Zoom: Weighing up the risks of video conferencing platforms

As we moved almost completely digital last year, video conferencing became the go-to for people and organisations needing to communicate,…

Data#3 Innovation Fund Set to Fortify Digital Transformation in WA Government Sector

June 21, 2021; Perth, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has launched Project…

Cybercrime Trends with Interpol

Cybercrime has skyrocketed during COVID-19 and while thankfully, the door is firmly closed on the year that was…

Cisco DNA - Automation Blog
Automating your Cisco Network – It’s in your DNA

With mobility and security threats drastically reshaping networking architectures, combined with the rise of cloud-first applications, IoT, AI and…

The risk of end of life hardware
The security risk of end of life hardware

Some things last forever, others are superseded by more improved models. The latter is particularly true in the fast-paced world…

Zero Trust Multi-Factor Authentication with Cisco Duo

Secure access to the cloud for any type of application using corporate data and proactively reduce the risk of data…

Patch and protect Exchange Server security vulnerabilities

I wanted to ensure all Data#3 customers are aware of an active zero-day vulnerability impacting multiple on-premises Microsoft Exchange Servers.

The Future in Focus: A Technology Report from Data#3

The unparalleled turbulence of 2020 and its resulting effects have been monumental. Driven by the global pandemic, mass changes to…

Cisco Multi-Cloud Connectivity
Uniting your distributed workforce with multi-cloud connectivity

Following a year perhaps best described as bonkers, it’s an opportune time to catch your breath and evaluate just how…

News----Data#3-Scores-Palo-Alto-Growth-Partner-of-the-Year
Data#3 Secures Palo Alto Growth Partner of the Year

Leading Australian technology services and solutions provider, Data#3, today announced that it has been named the Palo…

Webinar: Intellifent compliance and security solutions for Education
Intelligent compliance and security solutions for Education

For educators, student safety and wellbeing continue to remain a crucial priority. Following the rapid and widespread deployment of collaboration…

Webinar: IT Ops for security
IT Ops for Security

As business threats become increasingly sophisticated, having visibility and real-time intelligence at your fingertips has never been more critical. In…

Seven Minutes of Security | Microsoft Surface
7 Minutes of Security: Microsoft Surface

In our second 7 Minutes of Security episode, host and National Practice Manager – Security, Richard Dornhart consults Mackenzie Jackson,…

Webinar: Cloud-delivered network security with SASE
Introducing SASE: Cloud-delivered network security

Discover a new way to secure anywhere workers. In partnership with Palo Alto Networks, Data#3 invites you to watch this…

Are we becoming more security-minded?

We can all remember the time we started a new job, and a sticky note was stuck to the screen…

Video-Card---Gartner-Discussion-Video-What-is-SASE
Gartner Video Discussion: What is SASE?

Coined by Gartner in 2019, Secure Access Service Edge, or SASE, has quickly become a new player in the…

Don’t risk it: It’s time to rethink your data governance and security in Teams

As we approach the end of a year that’s been like no other, now is the perfect opportunity to reflect…

Introducing SASE – the cloud-delivered future of network security

Secure Access Service Edge (SASE – but pronounced ‘Sassy’ for perhaps intriguing reasons!) is the new kid on the block…

Blog-Q&A-Group-Security-Practice
Q&A with the Data#3 Group Security Practice

The Data#3 group Security practice spans a national team of experienced individuals with decades of combined…

Improve Security with Microsoft 365 and Surface

Security is a rising cost for most organisations. And it’s not a welcome one, with 81% of IT Managers currently…

Is your collaboration platform compromising your security?

The rapid and large-scale shift to remote working across many industries has raised new questions around the security of…

Safeguard your Veeam backups with Pure Storage FlashBlade SafeMode

Written in collaboration with Lawrence Ang and Dilupa Ranatunga of Veeam This is the second part of…

VMware and Carbon Black: An Advance for Cloud Endpoint Protection

Initially, analysts were surprised when VMware completed its $2.1 billion cash purchase of Carbon Black in August…

7 Minutes of Security | Splunk for IT Ops

In our first episode of 7 Minutes of Security, our host and National Practice Manager – Security, Richard Dornhart…

Big Security in a Small Business World:
10 myth busters for SMB cybersecurity

Several myths exist around how seriously SMBs take cybersecurity. This recently released Cisco report, “Big Security in…

Customer Story: Fiji National Provident Fund

Fiji National Provident Fund Gains Visibility of Devices and Software Licenses   Objective To better manage its Microsoft licenses, the…

JuiceIT Digital 2020 Digest | Edition 4

The 5 Things that Remain Unchanged for IT Leaders Post-COVID Jean-Baptiste Alphonse Karr wrote in 1849, ‘plus ça change, plus…

JuiceIT Digital 2020 Digest | Edition 3

Out of the Shadows: Getting Clarity with Your Post-COVID IT Landscape Imagine trying to establish strong security in your home,…

JuiceIT Digital 2020 Digest | Edition 2

Letting Go of Normal: Your Post-COVID Survival Guide Over the last few months, many homebound Australians have been taking stock.

JuiceIT Digital 2020 Digest | Edition 1

Business as Unusual: The Organisations That Will Emerge Strongest from 2020 When the bushfires that incinerated over 10 million hectares1…

A path to the new normal

Australians have a history of coming together in times of crisis. Through bushfires, floods and droughts, we support one another.

Sink or Swim: Seven Questions Business Leaders Must Answer in the Post-COVID Recovery Phase

Peter will be delivering a live webinar on “Leading Digital Change: Strategic Foundations for an Agile Response” as part of…

Safeguarding Student Data for the Future

As the education sector shifts to respond to COVID-19, thousands of students are transitioning to learning from home.

Solving the print problem now your workforce is remote

As COVID-19 continues on, a large number of Australian workers are rapidly adjusting to working from home. The good…

The Road to Recovery (Part 1): Navigating the technology shifts of COVID-19

Who has been more effective at driving your digital transformation strategy? Your CEO, your CTO, or COVID-19? It’s the viral…

The Remote Working Model

Every industry, from small businesses to the largest global enterprises, is experiencing dramatic changes to the way we work. There…

Rapidly deploy a secure mobile workforce

Hear from Ed Sawkins, Prisma Access Specialist at Palo Alto, on how you can prepare your network and remote…

Customer Story: St Mary’s College

St Mary’s College Safeguards Staff and Students with Next-Generation Firewall Solution Objective As one of Tasmania’s most respected educators, St…

Hobart’s St Mary’s College Safeguards Staff and Students with Next-Generation Cybersecurity Solution from Data#3

March 19, 2020; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has worked with…

Cybersecurity Considerations for COVID-19

It’s a situation that few of us thought we’d ever find ourselves in, but here we are. With the emergence…

Governance in Microsoft Teams: A foundation for success

When you think about collaboration and the concept of the ‘Modern Workplace,’ what’s the first thing that comes to…

Windows 7 Extended Security Updates

The time has finally arrived! On January 14, Microsoft formally announced the end of support for Windows 7. If you…

A tale of two Azure transitions

We’ve been speaking with customers a lot about the end of mainstream support for SQL and Windows Servers 2008.

Feeling insecure about LDAP?

March 2020 will be a critical month for system administrators and this advisory is a must read for anyone involved…

The challenges of integration in an app driven modern workplace
The challenges of integration in an app-driven modern workplace

It’s safe to say that our expectations around work/life balance, flexibility and remote working have been steadily changing. With new…

Customer Story: iNova Pharmaceuticals

From Frustrating to Fantastic: The Mobility and Cloud Solution Modernising the iNova Workspace Objective With a proliferation of applications and…

Customer Story: Baptcare

Baptcare Connects Vulnerable Australians with Modern Technology Solution Objective Baptcare provides accommodation, family and community services for the most vulnerable…

Customer Story: The Friends’ School

The Friends’ School Introduces Efficient HPE Nimble Storage Solution Objective As The Friends’ School’s existing storage solution neared its end…

Why upgrade to Microsoft 365 E5 for improved security

Over the course of the past few decades, Microsoft has gone from being unfairly perceived as an outcast in the…

Tackling cloud app security with Microsoft 365

Your organisation may not be in the cloud, but I can guarantee your employees definitely are. Cloud apps are…

Customer Story: Hydro Tasmania

Hydro Tasmania builds innovative IT environment that meets the needs of today and the future with Data#3 Objective To refresh…

Customer Story: Government Agency

Agency leads with security solution Company Overview: The Agency provides a critical service within Australia by acting on behalf of…

Customer Story: Government Agency

Simplified reporting enables staff to better serve community Company Overview: Supporting one of Australia’s most scenic coastlines that features fertile…

Symantec Cloud Security Threat Report 2019

Adapting to the New Reality of Evolving Cloud Threats Today’s fast growing hybrid IT environment challenges the basic principles of…

The Renaissance of the Data Centre

The why and how of modernising your data centre for digital transformation. Digital transformation is placing an overwhelming demand on…

Mobile Cybersecurity
Protecting GenMobile: the need for adaptive trust in cybersecurity

For better or worse we are all dependant on our mobile devices these days. This is especially true for the…

Gone Phishin’ – What to do if you suspect an attack

Recently, I have had many conversations with connections in several industries that have encountered a recent run of phishing emails.

Customer Story: Bank of us

Bank of us boosts processing power to underpin business growth HPE SimpliVity streamlines IT delivery at the only Tasmanian customer-owned…

Executive Guide | CASB 2.0 the next generation of cloud app security

More and more of our critical data, applications and infrastructure are moving from behind the firewall to the cloud –…

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However, as more and more apps and services move to the cloud, corporate data is often exposed in ways and places that you never imagined.
Solving the cloud security conundrum

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However,…

An Introduction to Symantec CloudSOC

A New Solution for Cloud App Security Symantec CloudSOC is a next generation cloud access security broker (CASB 2.0) solution…

Clinging to the Windows 7 Ledge: Are You Ready to Make the Leap to Windows 10?

Business is all about balancing risk and opportunity. Nowhere, perhaps, is this clearer than in the IT department, where the…

Customer Story: Melbourne City Mission

Ready for School: Melbourne City Mission leverages innovative technology to help prepare at-risk students for future employment Objective To deploy…

Melbourne City Mission leverages innovative Microsoft technology to help prepare at-risk students for future employment

April 08, 2019; Melbourne, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has worked with…

The State of Cybersecurity: Simplicity is the Ultimate Sophistication

2018 was, for those of us following the state of cybersecurity, a year of extremes. We had the good, the…

Workplace Cybersafety: the 10 Tips that Will Make Everyone Safer at Work and Online
Workplace Cybersafety: the 10 Tips that Will Make Everyone Safer at Work and Online

If you asked most workers, who is responsible for cybersecurity, they’d point you towards the IT department. While they would…

Finding cybersecurity equilibrium in the midst of a skills shortage

When building or retaining your cybersecurity teams, if you haven’t yet felt the symptoms of the cyber “skills shortage”…

Customer Story: Automobile Rental Company

Automobile Rental Company strengthens Disaster Recovery capabilities Objective Strengthen Disaster Recovery capabilities in multiple locations to ensure high availability, business…

Azure Security Blog
4 Azure security features you must know about

Hosting on the Microsoft Azure platform is a fast and simple method to deploy and manage web-based applications. Countless…

The Office 365 security features you didn’t know existed

When you use Office 365 every day, it can be easy to forget just how powerful it has become…

Customer Story: Office of Prosecutions
Customer Story: Office of Public Prosecutions

Migration to Office 365 Boosts Productivity at Victoria’s Office of Public Prosecutions Objective To create a modern working environment that…

Are your critical systems heading for the ICU? Prepare for Windows 7 and Office 2010 end of life.

Imagine being critically ill in the back of an ambulance, when just minutes from your nearest hospital you’re suddenly diverted…

Don’t just discover the cloud, control it!
Don’t just discover the cloud, control it!

End-users move constantly between devices and locations to access data when and where they need it for uninterrupted productivity. There…

Customer Story: Bathurst Regional Council

Bathurst Regional council moves to cloud with Software Asset Management (SAM) solution assessment Though the Bathurst region is a rural…

Customer Story: Flinders University
Customer Story: Flinders University

Flinders University Introduces Solution to Keep Students and Staff Safer Online Objective To gain the visibility needed to identify advanced…

Modern Desktop Management
Modern Desktop Management – Shift your Mindset, Not the Workload

Recently I was involved in a discussion in a Facebook group that asked the question “How do you find Intune…

Customer Story: Logistics Agency

Logistics company delivers with new security solution Company Overview Like many organisations, the customer had a complex environment featuring many…

Mobile Productivity
How to achieve mobile productivity without sacrificing security

One of the most pressing issues for modern businesses is cybersecurity. In fact our own customers confirmed that security…

Data#3 Security in Education
Security in Education | Expert Panel Discussion

Data#3 invited a panel of industry experts to discuss the evolving security requirements for education institutions, including the recently introduced…

Preparing for the Notifiable Data Breaches Scheme - Data#3
Preparing For The Notifiable Data Breaches Scheme

Source publication: ARN – Click to view on source website Information Assurance in Australia has always been important to…

The state of cybersecurity – Where do we go from here?

Nobody wants to be “that” IT person who thinks their organisation is secure, but then out of nowhere, a cyberattack…

Video Customer Story - The Southport School
Video Customer Story: The Southport School

Working closely with Data#3, The Southport School deployed a next-generation wireless network solution to provide seamless coverage, improved performance with…

Customer Story - The Southport School
Customer Story: The Southport School

The Southport School benefits from next-generation wireless network Objective To upgrade the school’s wireless network to deliver…

The Southport School - News
Data#3 Solution Helps The Southport School Lead the Way in Innovative Teaching

May 01, 2018; Brisbane, Australia: The Southport School has recently worked with Data#3 to implement a next-generation wireless network solution.

ASD Essential Eight Explained
The ASD Essential Eight Explained – eBook

The Evolving Cybersecurity Threat The last few decades have seen dramatic changes in the world of business. Today, organisations generate…

The obstruction blocking healthcare from adopting innovation

We hear a lot of hype about the medical and technological innovations advancing healthcare services. Today we’re seeing data collected…

Maximising business continuity for the always-on organisation

This service is temporarily unavailable… please try again later Imagine if Facebook went down for five minutes. Apart from the…

The importance of creating a culture of security awareness

What Is It? The users of your information systems are the key to your organisation’s success. These are the people…

Management Networks - Blog
Are Management Networks worth the hassle?

What Is It? Management Networks can be seen as a continuation of Network Segmentation, as they can yield significant benefits…

JuiceIT - Trend Micro
Paradigm Shifts – How can you prepare for the year ahead?

JuiceIT Sponsored Blog Remember the days when the extent of a cyberattack was defacing a website for fun,…

Cyberattacked Disaster Recovery
Facing the threat of cyberattacks: how does your disaster recovery solution stack up?

It’s a message every IT manager dreads. ‘Your personal files are encrypted by CTB-Locker. To decrypt the files, you need…

Data#3 and Tenable
Data#3 and Tenable Collaborate to Deliver Enhanced Cybersecurity Services to Customers

March 21, 2018; Brisbane, Australia: Leading Australian information technology provider, Data#3, today announced it has signed a partner agreement with…

What to look for in a SIEM?

What Is It?  The amount of information generated on your network is the stuff nightmares are made of, but…

Symantec JuiceIT 2018
Data in the Fast Lane

JuiceIT Sponsored Blog Formula One races are no longer won on the track. They’re won in the garage,…

Data#3 Blog CASB
Rock the CASBah

What is it? Cloud Access Security Brokers (also known as CASB), is usually pronounced “KAZ-BEE” in a style reminiscent of…

The Breach – Video Series from HP

New mandatory data breach notification laws come into effect on Feb 22nd, 2018. The new regulations make it compulsory for…

Cisco Umbrella: Security beyond the firewall

What attacks aren’t you seeing? What’s your organisation doing to block the threat of a breach? Are you still relying…

Data#3 Security Practice receives two prestigious industry awards

November 23, 2017; Brisbane, Australia: Leading Australian technology provider, Data#3, is delighted to announce that it has won two security…

Cisco Umbrella
Cisco Umbrella – a quick win in IT Security

One of the most challenging hurdles to implementing new security infrastructure in any organisation is integrating it into your existing…

Keep up with cloud apps
Keep up with cloud apps: Secure your organisation against growing threats

Even if you are not in the cloud, your employees probably definitely are. Cloud apps are essential to today’s connected…

The six printer security hotspots every business should check

11% of all security incidents are print related1. Smart print devices must now be treated with the same cybersecurity rigour…

6 common print security risks and how to fix them

Today’s Multifunction Printers are intelligent devices that contain hard drives, have operating systems, host apps, hold user credentials, and can…

Trojan Horse to your Security Strategy
The Trojan Horse to your security strategy

The Australian Cyber Security Council found that 90% of Australian organisations faced some form of successful or attempted cyber-attack during…

Three self-assessment tools for Office 365 and Azure that are often overlooked
Three self-assessment tools for Office 365 and Azure that are often overlooked

I often speak with customers who have existing Microsoft online tenancies, configuration, resources and security controls that have been configured…

Why choose a managed security service

In reviewing the Symantec 2017 Internet Threat Report, we’ve summarised some of the key stats and…

Australian Cybersecurity Laws are evolving – are you?

On February 13, 2017, the Privacy Amendment (Notifiable Data Breaches) Bill 2016 marks a very important milestone in…

ASD Essential Eight Strategy
Do you have an ASD Essential 8 (E8) strategy?

In February of 2017, The Australian Signals Directorate revised their long-standing go-to list of strategies to mitigate cyber security…

VMware NSX e-Book

The need to secure enterprise IT infrastructure and data is intuitive, but how we achieve that security must change; traditional…

What every Office 365 Administrator should know

By Bala Murugesan – Microsoft Cloud Specialist, Data#3 [Reading time: 3 mins] Office 365 Security and Compliance Centre The…

THE NEW IT SECURITY PARADIGM PART 4 – VMware’s NSX, and its Promise of a New Standard

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] Over my last 3…

THE NEW IT SECURITY PARADIGM PART 3 – Network Virtualisation & Encryption

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] The problem with encryption…

THE NEW IT SECURITY PARADIGM PART 2 – How Network Virtualisation Will Transform IT Security

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 3 minutes] Neighbourhood Watch When thinking of…

THE NEW IT SECURITY PARADIGM PART 1 – The Need for A New Security Perspective

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 4 minutes] Can you…

Ransomware: Plug the gaps in your defence strategy

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] Dealing with ransomware is becoming increasingly…

Will 2016 be the year IT Departments stand firm against cybersecurity threats?

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] The title of this article…

The BYOD predicament

By Chris Day, Solution Consultant, Data#3 [Reading time: 1 min] Personal computing devices are increasingly being used…

Should cybersecurity education be mandatory for staff?

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] It’s obvious that cybersecurity…

Balancing external collaboration and risk

By Chris Day, Solution Consultant, Data#3 [Reading time: 1 min] Working in collaborative situations provided Australian workers time-saving…

How to tackle human threat through identity management

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] I recently came across…

Ransomware takes aim at Australian organisations

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] There is mounting evidence that ransomware…

IoT and Security – is there a skills gap?

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] In the wake of technological…

Crafting an Identity-based Security Strategy for Cloud

By Richard Dornhart, National Security Practice Manager, Data#3 Limited As most of IT professionals would agree, cyber security…

Guest Post – Whaling – the new evolution in email cybercrime

By Ben Adamson, Lead Technical Consultant (Presales) APAC, Mimecast [Reading time: 1.30 mins] Everyday cybercriminals learn from…

Customer Story: City of Perth

Company Overview: The City of Perth is a dynamic, statutory entity constituted under the Local Government…

It’s time to kill the password

By Richard Dornhart, National Security Practice Mananger, Data#3 Passwords make me stop and think. Typically, I am…

Why Security is a focus for 2016: A CEO’s perspective

By Laurence Baynham, Chief Executive Officer, Data#3 Security was the number one technology priority for Australian…

Customer Story: Corrs Chambers Westgarth

A Collaborative Approach for Corrs Chambers Westgarth Background: With more than 170 years of history, Corrs Chambers Westgarth (“Corrs”) is…

Symantec Solution Case Study

Securing Remote Access for Financial Services Users Background: This Financial Services customer is focused on delivering high quality, cost effective…

Service Catalogues can transform the mobility experience

By David Barclay, National Practice Manager, Data#3 In the world of IT Service Management…

Mobility security is no longer about MDM

By Richard Dornhart, National Practice Manager – Security, Data#3 As we’ve discussed in previous posts,…

Enhancing your Microsoft Azure and Office 365 investment with Symantec

Find out why Microsoft and Symantec are better together By Symantec Getting ready to move infrastructure…

Enterprise mobility challenges – Managing devices and the workspace

43yUlLGW-JI By David Barclay, National Practice Manager, Data#3 Previous articles in this series have described the…

What is the reality of enterprise mobility for an organisation today?

By David Barclay, National Practice Manager, Data#3 A 2013 IDC white paper[1]…

SA Water

End User Computing Strategy Sets Framework for Future Background: Owned by the Government of South Australia, SA…