Our Blog

23

Oct

How the modern workplace is creating security risks that you need to address now

In the truly digital world we now live in, work takes place everywhere the workers are. People are accessing systems using remote devices and connections that could be out of your control. Information is often stored on a combination of cloud-based and on-premises servers and accessed by anyone with the right credentials.  ... read full post

Posted by:  David Caddick , TS - Enterprise Solutions - Cloud Design & Integration |  23 October 2019

Security, Digital Workplace, Collaboration, Modern Workplace, #workyourwaysecurely, data security


Rating: 
(0 votes)

09

Oct

Five security risks faced by the modern workforce and how you can avoid them

The modern workplace sees work and home life co-existing through new technology that diversifies the work environment. When your employees’ workplace is anywhere, they can enjoy more benefits and flexibility, and can even improve productivity, but it also can put the security of your company at risk if you don’t have the proper protection in place. ... read full post

Posted by:  Gavin van Niekerk , Principal Consultant |  09 October 2019

Security, Digital Workplace, Collaboration, Modern Workplace, #workyourwaysecurely


Rating: 
(0 votes)

09

Oct

Why you need to turn on multi-factor authentication now

Microsoft’s identity-driven security summit for partners held on September 17th at its Redmond headquarters kicked off with a statistic to focus the mind. ... read full post

Posted by:  Alan Schmarr , Practice Lead |  09 October 2019

Security, Digital Workplace, Collaboration, Microsoft Office 365, Modern Workplace, #workyourwaysecurely


Rating: 
(1 votes)

03

Sep

Inspire: Trust and technology’s inflection point

It was 22 minutes into Brad Smith’s CoreNote presentation at this year's MIcrosoft Inspire and I had a lump in my throat. ... read full post

Posted by:  James Page , Practice Director Partners, Alliances & Channels |  03 September 2019

Data Analytics, Data Insights, Security, #Inspire, Trust


Rating: 
(0 votes)

08

Feb

New Microsoft Security and Compliance offerings

Security and compliance within organisations are getting more and more attention based on the increase of cyberattacks. Coupled with this, data privacy regulations such as General Data Protection Regulation (GDPR) is also something that cannot be under estimated. ... read full post

Posted by:  Dirk Prinsloo , Principal Consultant CD&I |  08 February 2019

Office 365, Security, Compliance, SaaS


Rating: 
(0 votes)

17

Sep

How to leverage your existing investments to improve your security posture

Some businesses mistakenly think that implementing comprehensive and proactive security solutions requires a large investment of both funds and time.  ... read full post

Posted by:  Gavin van Niekerk , Principal Consultant |  17 September 2018

Security, Security Readiness, Threat landscape


Rating: 
(0 votes)

14

Sep

Creating your security roadmap

Securing your organisation’s data and workloads depends on having a clear, comprehensive view of your current security posture as well as any gaps that need to be filled – your roadmap. ... read full post

Posted by:  Jaen Snyman , National Business Manager Cloud Design and Integration |  14 September 2018

Security, Security Readiness, Threat landscape


Rating: 
(0 votes)

10

Sep

Why any cybersecurity efforts must start with understanding your current posture

As organisations look to improve their security approach, the number one step to take is to fully understand your current posture. ... read full post

Posted by:  David Caddick , TS - Enterprise Solutions - Cloud Design & Integration |  10 September 2018

Security, Security Readiness, Threat landscape


Rating: 
(0 votes)

06

Sep

Understanding the threat landscape and how you can protect your business

Most organisations are, by now, well aware of the need for a strong cybersecurity posture. They know that cybercriminals are constantly trying to gain access to corporate networks to steal information that they can either monetise or use to compromise the business (or both). ... read full post

Posted by:  Gavin van Niekerk , Principal Consultant |  06 September 2018

Security, Security Readiness, Threat landscape


Rating: 
(1 votes)

18

Jul

How automation can make it easier to comply with privacy legislation

New privacy legislation around the world puts increasing pressure on organisations not just to keep personal information safe but also to be able to provide an individual’s information on request. These requests can create a significant time and cost burden for organisations that aren’t fully prepared for them. ... read full post

Posted by:  Doug Baxter , Solution Specialist |  18 July 2018

Privacy, Security, GDPR, NDB, Privacy legislation, Privacy and compliance


Rating: 
(0 votes)

16

Jul

Why having a clear, easy-to-follow process is crucial for complying with privacy legislation

New and old privacy legislation around the world has Australian organisations reviewing their processes to ensure they can comply with all the different aspects of such legislation. One of the key challenges of these legislative requirements is complying with information access requests. ... read full post

Posted by:  Doug Baxter , Solution Specialist |  16 July 2018

Privacy, Security, GDPR, NDB, Privacy legislation, Privacy and compliance


Rating: 
(0 votes)

12

Jul

How adequate training and reinforcement can help you comply with privacy legislation

In Australia, the Privacy Act 1988 and, specifically, the Notifiable Data Breaches (NDB) scheme being part of that legislation, has organisations working to keep personal data secure. Europe has also introduced its General Data Protection Regulation (GDPR), which affects businesses anywhere in the world that interact with European citizens.  ... read full post

Posted by:  Doug Baxter , Solution Specialist |  12 July 2018

Privacy, Security, GDPR, NDB, Privacy legislation, Privacy and compliance


Rating: 
(0 votes)

10

Jul

Privacy legislation compliance: key challenges and how to overcome them

Most people aren’t completely aware of just how much of their personal information is gathered and stored by organisations they may never have heard of or may have quickly forgotten about.  ... read full post

Posted by:  Doug Baxter , Solution Specialist |  10 July 2018

Privacy, Security, GDPR, NDB, Privacy legislation, Privacy and compliance


Rating: 
(0 votes)

02

Jul

The party may be over for PageUp, but how long will the hangover last?

I recently received an email from a major corporate organisation, advising me that my personal data may have been breached. Not by them, and not by me. That organisation used the services of Melbourne-based PageUp People to manage its recruitment processes.  ... read full post

Posted by:  Doug Baxter , Solution Specialist |  02 July 2018

Privacy, Security, GDPR, NDB, Privacy legislation, Privacy and compliance


Rating: 
(0 votes)

10

May

Beware Password Spray style attacks targeting your ADFS

While we still need to rely on passwords, we now have to be aware of ‘Password Spray’ style attacks which target our ADFS. In the past, attackers would simply launch a ‘Brute Force Attack’ to try and effectively guess someone’s correct password to gain access – these days attackers are moving towards a more stealthy approach where they might automate this process over a much longer time frame so they don’t trip any alarms or trigger any alerts. ... read full post

Posted by:  David Caddick , TS - Enterprise Solutions - Cloud Design & Integration |  10 May 2018

Privacy, Security, ADFS


Rating: 
(0 votes)

Top Rated Posts

Blog archive

Stay up to date with all insights from the Empired blog