EWOTEE Ep 5: Patching Apps & Operating Systems

By Melissa Hoarau | November 19, 2021

Patch Applications & Operating Systems Essential 8 Mitigation Strategies 2 & 3: (Patches, updates, or vendor mitigations for security vulnerabilities in internet-facing services should be applied within two weeks of release, or within 48 hours if an exploit exists.) Let’s delve into what this means.     What are patches? Patches are fixes in software […]

Why your business needs a Password Manager

By eStormAdmin | November 18, 2021

Trying to remember your password for every website, portal, tool and piece of software is borderline impossible. Some organisations like to solve this problem by using a very simple and memorable password, variations of the same password, or worse – the exact same password for everything! That’s just asking for trouble. Simple and memorable passwords […]

EWOTEE Ep 4: User Application Hardening

By Melissa Hoarau | November 8, 2021

User Application Hardening Hi everyone, and welcome to this week’s episode of eight weeks of the essential eight. This week we’re going to explore the essential eight strategy User Application Hardening, and how you can achieve maturity level one. The ACSC defines this strategy as: Essential 8 Mitigation Strategy 5: User application hardening to configure […]

EWOTEE Ep 3: Application Control

By Melissa Hoarau | October 29, 2021

Hi everyone, and welcome to episode three of eight weeks of the essential eight. In this episode we’re going to explore Application control. We’re going to learn what it is, why it’s considered essential, and how to implement application control in a way that achieves maturity level one. Let’s begin! What is application control? Application […]

EWOTEE Ep 2: Restricting Admin Privileges

By Melissa Hoarau | October 12, 2021

  Hi everyone, and welcome to this week’s episode of Eight Weeks of the Essential Eight. In this episode we’ll be exploring administrative privileges and why restricting these privileges is vital in protecting your business against cyber-attacks. The ACSC defines this strategy as: restrict administrative privileges to operating systems and applications based on user duties. […]

EWOTEE Ep 1: Essential Eight & Maturity Model Explained

By Melissa Hoarau | October 1, 2021

  Hello and welcome to the first episode of Eight Weeks of the Essential Eight. Topic Areas: What is the Essential Eight? Do I need to implement the essential eight? Why the essential eight? The Essential 8 Maturity Model Targeting a Maturity Level History of the Essential Eight: So lets start with a brief history […]

You’re vaccinated, but is your technology?

By Melissa Hoarau | September 21, 2021

As the world begins to open up and return to some semblance of normality, businesses are now in a debate over how to proceed with the return of staff into offices. Over the last 1.5 years, remote desktop access and cloud technology allowed employees to work from the safety of their own homes, but how […]

Apple September 2021 Keynote – What’s New?

By Melissa Hoarau | September 15, 2021

In Apple’s September 2021 Keynote ‘California streaming’, the tech giant’s CEO Tim Cook unveiled Apple’s latest product range. The announcement was headlined by the new iteration of the iPhone, and was followed by an introduction of the latest iPads and Apple watches. Read on for a quick recap of Apple’s biggest announcements. iPhone 13  The […]

Should you backup Microsoft 365?

By Melissa Hoarau | September 12, 2021

Are Microsoft 365 backups necessary? With benefits like easy access to files, emails, and documents, plus improved collaboration across teams, it’s no surprise that Microsoft 365 is an essential tool for most businesses across the globe. But what happens when your Microsoft 365 data is lost? Downtime as a result of lost or corrupt data […]

Chromebooks vs iPads in the Classroom

By Melissa Hoarau | September 1, 2021

  As the demand for technology increases in classrooms, the Chromebook vs iPad debate has been an ongoing discussion for schools and parents seeking to make the best technological choices for the development of their students and children. Chromebooks and iPads are currently the forerunners when it comes to portable devices in the classrooms, and […]