Our IT Security Blog
What are the 8 main cyber security threats?
Here are eight of the main cyber security threats: Malware: Malware, short for "malicious software," refers to any program or code designed to harm or exploit a system or network. Phishing: Phishing is a type of social engineering attack that uses deceptive emails,...
What are the 10 steps to cyber security?
The UK National Cyber Security Centre (NCSC) has developed the following 10 steps to cyber security that businesses and organizations can follow to improve their cyber security posture: Risk Management: Identify, assess, and manage risks to your organization's...
Where do i report cyber crimes in Australia?
In Australia, you can report cyber crimes to the Australian Cyber Security Centre (ACSC) which is the primary agency responsible for cybersecurity in Australia. The ACSC is a part of the Australian Signals Directorate (ASD), which is an intelligence agency responsible...
Prevent ‘Use this account everywhere on your device’ – M365 Apps
When you install Office 365 ProPlus / M365 Apps, you may be presented with a screen which says ‘Use this account everywhere on your device’. Below is how to prevent that screen appearing, and prevent the Azure AD device registration that may result from pressing yes....
Bypass Windows 11 Network Setup to create a local user account
Bypass Windows 11 Network Setup to create a local user account. Whether you are turning on your new device for the first time or performed a clean installation of Windows 11, say are always prompted to join a WiFi Network if you are not using an Ethernet cable to...
5 Essential Elements To A Cyber Security Report
Here are five essential elements of a cybersecurity report: Executive Summary: A brief overview of the report's findings, including the organization's current cybersecurity posture, key areas for improvement, and recommendations for reducing risk. Scope: A clear...