The digital nomad lifestyle sounds idyllic, with visions of working on laptops in breathtaking locations. However, being a digital nomad presents unique challenges, especially when it comes to cybersecurity. As a nomad, or a road warrior, your devices are very … Read More

Higher education institutions find themselves targets of cybersecurity threats at an alarming rate.  Higher education IT departments must respond to the ever growing number of cyber threats that their students, staff and systems encounter. They must safeguard a large number … Read More

An article published by the ABC has highlighted the dangers of data breaches and identity theft, including how they occur and the consequences.  It shows how a person’s full identity and information can be pieced together by cybercriminals, and the dangers of … Read More

Society is abuzz with the emergence of AI technology, and tools like ChatGPT and Bard have generated significant excitement. Developers are in a race to introduce advanced features to their applications that can automate tasks for consumers, and these features range from composing emails to … Read More

The advanced nature of cybersecurity means that criminals now have many points of access. These now include previously unthought of items such as children’s toys and even our garbage. Many common items can lead to information or identity theft but … Read More

The number of applications and digital tools that employees use on a regular basis is growing, with some departments utilising between 40 and 60 different digital tools to carry out their tasks. Many apps generate alerts and notifications, such as … Read More

AI chatbots, such as ChatGPT, are frequently in the headlines, and they certainly provide a lot of useful capabilities for their users; though as with many new online technologies, there will be those who use them to exploit and cause … Read More

The need to back up data has been a requirement since the invention of the computer. Data losses can occur for a variety of reasons, including hard drive and system crashes, security breaches and virus infections, and unfortunately most of … Read More

On the 27th of February, the Australian government convened a cybersecurity roundtable to make Australia the most cyber-secure country by 2030. Members from the public service, and intelligence agencies, along with experts from business and industry, were in attendance to … Read More

Vulnerabilities in technology are an unfortunate side effect of innovation. For example, when software companies release an update, it can contain weaknesses in the code, which hackers can use to exploit. Once this is realised the vulnerabilities are addressed with … Read More

1 2 3 4 5 6 12