Firewall Rules: Do the Old Rules Still Apply?
16 April 2025
Conducting a review of firewall rules and logs helps to ensure an organisation is maintaining a secure, efficient, and compliant network that provides protection against evolving threats and minimises the risk of unauthorised access or disruptions. It is not uncommon for outdated or unnecessary firewall rules to accumulate, increasing administratio…
Read More
ASD Essential Eight Maturity Levels Explained
02 April 2025
The ASD Essential Eight is designed to make organisations more resilient against cyber threats. But knowing what to implement is only half the story - the real challenge is understanding how well the eight strategies have been put into practice. That’s where the Essential Eight Maturity Model comes in.
Read More
Developing a Cybersecurity Strategy & Risk Register - Key Considerations
19 March 2025
Every organisation faces cyber security threats, but the specific risks, challenges, and solutions vary. There is no universal approach - each organisation must build a cybersecurity strategy that aligns with its structure, industry, and goals. A well-designed strategy not only protects against threats but also ensures cyber security investments su…
Read More
Is it a Policy, Process or Procedure?
20 February 2025
Policies, processes, and procedures are distinct yet interconnected components of organisational governance, due to a number of factors confusion often arises over what constitutes a policy, process and procedure.
Read More