Client Profile Toowoomba Grammar School was established under the Grammar Schools Act of 1860 to provide a quality education designed for boys. TGS is a non-denominational, independent day and boarding school for boys from Prep to Year 12. TGS has … Read More

Smaller organisations, including not-for-profits, are at a higher risk of falling victim to cyberattacks primarily due to their challenges  to allocate what may be limited resources to strengthen their cybersecurity. This vulnerability is further compounded by the fact that some individuals harbour … Read More

Last year saw cybersecurity threats continue to grow in prevalence, and with the introduction of AI tools such as ChatGPT, the risk of cyber-attacks will continue to be ever-present.  The safeguarding of sensitive data and systems necessitates a holistic, integrated approach that … Read More

The digital nomad lifestyle sounds idyllic, with visions of working on laptops in breathtaking locations. However, being a digital nomad presents unique challenges, especially when it comes to cybersecurity. As a nomad, or a road warrior, your devices are very … Read More

Higher education institutions find themselves targets of cybersecurity threats at an alarming rate.  Higher education IT departments must respond to the ever growing number of cyber threats that their students, staff and systems encounter. They must safeguard a large number … Read More

An article published by the ABC has highlighted the dangers of data breaches and identity theft, including how they occur and the consequences.  It shows how a person’s full identity and information can be pieced together by cybercriminals, and the dangers of … Read More

Society is abuzz with the emergence of AI technology, and tools like ChatGPT and Bard have generated significant excitement. Developers are in a race to introduce advanced features to their applications that can automate tasks for consumers, and these features range from composing emails to … Read More

The advanced nature of cybersecurity means that criminals now have many points of access. These now include previously unthought of items such as children’s toys and even our garbage. Many common items can lead to information or identity theft but … Read More

The number of applications and digital tools that employees use on a regular basis is growing, with some departments utilising between 40 and 60 different digital tools to carry out their tasks. Many apps generate alerts and notifications, such as … Read More

AI chatbots, such as ChatGPT, are frequently in the headlines, and they certainly provide a lot of useful capabilities for their users; though as with many new online technologies, there will be those who use them to exploit and cause … Read More

The need to back up data has been a requirement since the invention of the computer. Data losses can occur for a variety of reasons, including hard drive and system crashes, security breaches and virus infections, and unfortunately most of … Read More

On the 27th of February, the Australian government convened a cybersecurity roundtable to make Australia the most cyber-secure country by 2030. Members from the public service, and intelligence agencies, along with experts from business and industry, were in attendance to … Read More

1 2 3 4 5 6 7 12