<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=455441907967559&amp;ev=PageView&amp;noscript=1">

News & Views

Your Guide to the ASD Essential 8 Strategies (And How to Implement Them)

by John Lane - Nov 29, 2018

Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.

Read Post
0 Comments

TAGS: cyber security, essential 8, strategy, it strategy, implementation, tips, webinar, risk, it security

Phishing Attacks: How to Instantly Spot an Email Scam

by John Lane - Sep 25, 2018

Not only are phishing scams incredibly common, they're also getting more believable and effective as time goes on. According to one recent study, a massive 76% of all organisations said that they experienced phishing attacks in 2017. Not only that, but the frequency rate of those attacks actually took a massive 65% leap compared to 2016.

Read Post
0 Comments

TAGS: cyber security, phishing, scam, how to, it security

Powernet Ranks 5th Best MSP in Australia

by John Lane - Jul 19, 2018

At Powernet, we've always worked hard to become more than just another managed service provider. We understand how important IT truly is in the modern era, both in terms of your business and the value that it allows you to provide to your audience. That's why every decision we make ultimately begins with that which matters most in mind: our customers.

Read Post
0 Comments

TAGS: hybrid IT, hybrid cloud, MSP, managed service provider, powernet, IT systems, it security, cyber security

Australia’s Data Breach Notification Laws Part 4: What's Next?

by John Lane - Jun 21, 2018

Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 3: Developing a Data Breach Response Plan

by John Lane - Jun 18, 2018

Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 2: How to Protect Your Business

by John Lane - Jun 18, 2018

We've discussed what the notifiable data breach laws entail, why they exist, and why they'll be so important to both businesses and private citizens across the country moving forward. But to put it simply, no single mitigation strategy is guaranteed to A) apply to every type of business, or B) prevent every type of cybersecurity incident that you may encounter. 

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 1: What It Means and Why It Matters

by John Lane - Jun 14, 2018

It's official: the February 22, 2018 deadline has come and gone and Australia's new data breach notification laws are now in full effect. If you still feel unsure about what these new laws entail, or if you were only scarcely aware that they existed in the first place, don't worry — it’s not too late to be informed.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

The Importance of Cloud Security: Just How Safe is Your Business in the Cloud?

by John Lane - May 7, 2018

According to one recent study, more than 50% of all data that is currently held in Australian cloud-based systems is considered to be sensitive. While this is not necessarily shocking, in a related statistic, the same study also revealed that roughly 90% of Australian executives said that they believed (or knew beyond the shadow of a doubt) that one or more people within their organisations were using cloud-based systems in violation of their existing approved policies.

Read Post
0 Comments

TAGS: cloud, it security, it strategy, cyber security

Recovery from a Cyberattack: What You Need to Know

by Daniel Williams - Mar 1, 2018

It's the type of situation that absolutely nobody wants to find themselves in. One minute you're at an afternoon meeting, talking with employees about that big project you're working on for your most important client. The next minute you've got a member of your IT staff rushing to the room, letting you know that they've detected suspicious activity on your network.

Read Post
0 Comments

TAGS: cyber security, disaster recovery planning, it security

6 Things to Know About the Future of Cybersecurity

by John Lane - Feb 27, 2018

Cybersecurity is now one of the most pressing issues that businesses face regardless of the the industry that it's operating in. You no longer have to be a tech organisation to think about things like encryption and two-factor authentication because today, there is no business too small or too obscure to worry about strengthening your cybersecurity efforts in this dangerous digital world we're now living in.

Read Post
0 Comments

TAGS: it security, cyber security, trends