03 9070 3555
Lilydale, Victoria 3140
[email protected]
  • Home
  • About Us
  • Services
    • Business Email Hosting
    • Business Continuity & Disaster Recovery
    • Cyber Security
      • Active Threat Hunting
      • Enhance Your Security
      • Human Risk Management
      • Hunt Or Be Hunted
    • IT Support
      • IT Support Bayswater
      • IT Support Lilydale
      • IT Support Melbourne
      • IT Support Near Me
      • IT Support Nunawading
      • IT Support Ringwood
      • IT Support Sydney
      • IT Support Yarra Valley
    • Managed IT Services
    • Network Continuity
    • Website Hosting
  • Blog
  • Contact Us
03 9070 3555
Lilydale, Victoria 3140
[email protected]
Guarana IT

Guarana IT

Simplifying Technology

  • Home
  • About Us
  • Services
    • Business Email Hosting
    • Business Continuity & Disaster Recovery
    • Cyber Security
      • Active Threat Hunting
      • Enhance Your Security
      • Human Risk Management
      • Hunt Or Be Hunted
    • IT Support
      • IT Support Bayswater
      • IT Support Lilydale
      • IT Support Melbourne
      • IT Support Near Me
      • IT Support Nunawading
      • IT Support Ringwood
      • IT Support Sydney
      • IT Support Yarra Valley
    • Managed IT Services
    • Network Continuity
    • Website Hosting
  • Blog
  • Contact Us
Home>Blog>Cybersecurity (Page 11)

Category: Cybersecurity

Updated on October 5, 2022November 25, 2022/ Leigh Harrison

Simple Guide to Follow for Better Endpoint Protection

Simple Guide to Follow for Better Endpoint Protection

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints a company has will vary by business size. Companies with less than 50 employees have …

Read More
Updated on October 5, 2022November 20, 2022/ Leigh Harrison

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed …

Read More
Updated on October 5, 2022November 10, 2022/ Leigh Harrison

Checklist for Better Digital Offboarding of Employees

Checklist for Better Digital Offboarding of Employees

Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a company, there is a process that needs to happen. This is the process of “decoupling” …

Read More
Updated on October 5, 2022November 5, 2022/ Leigh Harrison

9 Urgent Security Tips for Online Holiday Shopping

9 Urgent Security Tips for Online Holiday Shopping

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Don’t forget to stay safe online during the buying frenzy that occurs this time of year. An ounce of cybersecurity prevention is definitely worth a pound …

Read More
Updated on September 2, 2022October 25, 2022/ Leigh Harrison

What Is Microsoft Defender for Individuals & What Does It Do?

What Is Microsoft Defender for Individuals & What Does It Do?

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located in employee homes. The outsourcing market has also contributed to the change in company networks. …

Read More
Updated on April 17, 2024October 25, 2022/ Leigh Harrison

What Is Microsoft Defender for Individuals & What Does It Do?

What Is Microsoft Defender for Individuals & What Does It Do?

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located in employee homes. The outsourcing market has also contributed to the change in company networks. …

Read More
Updated on September 2, 2022October 20, 2022/ Leigh Harrison

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer issues a patch to fix the vulnerability. But it’s not long before a new feature …

Read More
Updated on September 2, 2022October 15, 2022/ Leigh Harrison

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report by cybersecurity firm Barracuda Networks debunks this myth. Their report analyzed millions of emails across …

Read More
Updated on September 2, 2022October 10, 2022/ Leigh Harrison

Internet Explorer Has Lost All Support (What You Need to Know)

Internet Explorer Has Lost All Support (What You Need to Know)

After being the main entry to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is gone. As of June 15, 2022, Microsoft dropped the web browser from support. IE ushered in the age of connection to the world in 1995 and held a majority of the browser market share for many …

Read More
Updated on August 8, 2022September 30, 2022/ Leigh Harrison

You Need to Watch Out for Reply-Chain Phishing Attacks

You Need to Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a ransomware attack for a payout. Or possibly plant spyware to steal sensitive info. Sending a …

Read More

Posts pagination

Page 1 … Page 10 Page 11 Page 12 … Page 14

Categories

  • Business
  • Business Continuity
  • Cloud
  • Cybersecurity
  • IT Management
  • Microsoft
  • New Technology
  • Online Presence
  • Productivity
  • Working from Home

Popular Posts

  • Cybersecurity

    13 Strategies To Make Your Cybersecurity Failproof

  • Cybersecurity

    Making Your Mobile Devices Safe From Cyberattacks: The 9 Best Practices

  • Cybersecurity

    How To Choose Your VPN To Boost Protection Against Cyberattacks

Copyright © 2021 LeighTech Group, trading as Guarana IT ABN 72 591 066 334.