Latest Technology and Status Updates
The Essential Eight
The Australian Cyber Security Centre’s Essential Eight are a prioritised list of mitigation strategies to assist organisations in protecting their systems against a range of adversaries/security attacks. The mitigation strategies can be customised based on each organisation’s risk profile and the adversaries they are most concerned about. While no single mitigation strategy is guaranteed to […]
How to block your caller ID on your mobile phone – per call
Now that you might be working outside the office more, and are using your mobile phone as you don’t have access to your company phone system, you may not want your mobile number to be displayed (caller ID) – especially if using your personal mobile for business reasons. You could simply turn off your caller […]
Tips on how to work from home and stay productive
I know you’ve probably received many, many emails re COVID19 over the last few weeks, some useful, some hype and some just plain advertising. The aim of this one, is to give you some helpful information so that you can be ready to work from home, as well as hopefully to help make working at […]
Strategies for online face to face meetings
During this time, for most of us, there a great many changes to how we work and how we live – you may find yourself needing to attend online meetings. You, or someone you work with, may start working from home and or from a different site to the office environment you’re used to and […]
Google Just Gave 2 Billion Chrome Users A Reason To Switch To Firefox
Article worth a read – https://www.forbes.com/sites/kateoflahertyuk/2019/05/30/google-just-gave-2-billion-chrome-users-a-reason-to-switch-to-firefox/#5e405800751f
Google, Huawei, US and China Governments!!
As Australians, and considering data sovereignty, control of our data, and privacy, I feel it’s time to put this issue on the radar in our decision making processes. I can’t help but feel we can no longer trust the international technology giants and overseas governments when it comes to being in control of our data […]
Gmail confidential mode launching on by default on June 25 2019
Confidential mode provides built-in information rights management controls in your emails by allowing senders to create expiration dates and revoke previously sent messages. Because a sender can require additional authentication via text message to view an email, it’s also possible to protect data even if a recipient’s email account has been hijacked while the message […]

Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’
This is “crazy stuff!!” See the Motherboard article here Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’ While there is no single mitigation strategy to guarantee the prevention of cyber security incidents it’s fair to say the basics of securing a network and its resources were most likely not covered off appropriately […]

Hardware Token-based 2FA with the WebAuthn API
W3C and FIDO Alliance Finalize Web Standard for Secure, Passwordless Logins. Major browsers and platforms have built-in support for new Web standard for easy and secure logins via biometrics, mobile devices and FIDO security keys. A friendly solution to password theft, phishing and replay attacks – W3C says “It’s common knowledge that passwords have outlived […]

Protect your accounts from data breaches with Google Password Checkup
Google say they can keep your account safe from hijacking with a defense in depth strategy that spans prevention, detection, and mitigation. To quote Google “As part of this, we regularly reset the passwords of Google accounts affected by third-party data breaches in the event of password reuse. This strategy has helped us protect over […]