The Essential 8 Cybersecurity Model

The Essential 8 Cybersecurity Model

4 simple changes in your IT strategy can mitigate 85% of security risks. They are the “Top 4 Strategies to Mitigate Targeted Cyber Intrusions” as initially recommended by the Australian Government’s Australian Signals Directorate (ASD). Whitelist applications Patch applications Patch Operating systems Minimise administrative privileges As soon as we bring computers under management, we quickly, easily and transparently implement 3 …

Beware the RAT! - remote access tool

Beware of the RAT!

A remote access tool or RAT, clandestinely installed on your system could wreak havoc and completely immobilise your business. Tool or Trojan? RAT can also stand for remote administration tool, but it is often referred to as a remote access Trojan, especially when installed silently and with malicious intent, as a back door into your system. Malware attached to an …

2fa | Setup 2-factor authentication – do it now!

You will have noticed that banks and other financial institutions now commonly offer a means of providing an additional form of identification. After entering a user name and password, the user must use a pre-defined method to provide an additional form of authentication. Usually, this is in the form of a spontaneously generated key, a 6-digit number, for example. This …