Your Digital Technology Agency - helping business since 1993

 Latest Technology and Status Updates 

Cloud Application Protection

ESET Cloud Office Security offers advanced protection for Microsoft 365 and Google Workspace apps. It includes antispam, anti-phishing, and anti-malware defenses, as well as advanced threat defense through ESET LiveGuard Advanced, which analyzes suspicious samples in a cloud sandbox. The solution also provides a cloud-based console for management and automation, ensuring continuous protection for new […]

Benefits of Local Large Language Models

Local large language models (LLMs) refer to powerful artificial intelligence (AI) systems designed to understand and generate human-like text, which are deployed and run on local hardware rather than relying on cloud-based services. These models can be used for various natural language processing tasks, such as text generation, summarisation, translation, and sentiment analysis. Benefits of […]

Safetica – data loss prevention and insider risk management solutions to protect sensitive information

Safetica offers data loss prevention and insider risk management solutions to protect sensitive information. It provides tools for data discovery and classification, user activity monitoring, and insider threat detection. The platform helps businesses comply with regulations like GDPR, PCI-DSS, HIPAA, and ISO/IEC 27001. Safetica ensures confidential data is not shared with unauthorised parties and aids […]

Inside Australia’s drive to repatriate data and workloads

Inside Australia’s drive to repatriate data and workload

Introducing Python in Excel: The Best of Both Worlds for Data Analysis and Visualization

Microsoft article

Top Five Attacking IPs This Month: Their Locations May Not Be Where You Think

Wordfence article

Are cloud providers too big to fail?

Too big to fail used to apply exclusively to banks and financial services institutions, but now regulators around the world are concerned about a different type of organisation creating systemic risks to the global financial system. As more and more banks move critical processes to the cloud, reliance upon a very small number of dominant […]

ESET® CYBERSECURITY AWARENESS TRAINING

ESET Cybersecurity Awareness Training is specifically designed to educate your workforce—because employees who recognize phishing, avoid online scams and understand internet best practices add a vital layer of protection for your business. Read More

An Inside Look at a Real Phishing Attack

Phishing attacks are growing more sophisticated and are still one of the most common threats to organisations. Phishing can lead to credential theft, unauthorised access to sensitive systems, and data breaches of confidential information. In this guide, we dissect the anatomy of a phishing attack using a real-life case study of a popular social network […]

The Essential Eight

The Australian Cyber Security Centre’s Essential Eight are a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries/security attacks. The mitigation strategies can be customised based on each organisation’s risk profile and the adversaries they are most concerned about. While no single mitigation strategy is guaranteed to […]