Cyber Security Archives - Technicalities

Tag: Cyber Security

CrowdStrike: The crash and Repercussions

CrowdStrike: The crash and Repercussions Just over a week ago, nearly everything ground to a halt. Microsoft computers started crashing which caused an outage that globally stopped 5,000 flights from taking off, supermarket checkouts to stop working, and Marvel Stadium to only allow patrons in based on viewing membership cards; like back in the 1990s.…
Read More

How Copilot Handles Your Data in Microsoft 365

How Copilot Handles Your Data in Microsoft 365 In an era where digital collaboration and productivity tools have become essential, understanding how your data is managed and protected is crucial. Microsoft 365’s Copilot feature is designed to enhance productivity by integrating AI-driven assistance across various applications. This blog delves into how Copilot handles your data…
Read More

Cyber Awareness Training: Our Partnership with Phished

Cyber Awareness Training: Our Partnership with Phished In today’s digital age, cybersecurity threats are an ever-present concern for individuals and organizations alike. Among these threats, phishing remains one of the most prevalent and damaging. As cybercriminals continually refine their techniques, it is imperative that we stay ahead of the curve to protect our sensitive information…
Read More

Cyber Security Review: Microsoft 365

Cyber Security Review: Microsoft 365 Cyber Security is a rapidly evolving space. What works today could be exploited tomorrow. On a daily basis we at Technicalities are researching the latest scams, viruses and vulnerabilities within both software and hardware. Many of our customers live in the Microsoft 365 world due to its ease of communication…
Read More

The Need for a Good Firewall

The Need for a Good Firewall Almost all organisations employ a firewall as a security tool that monitors and filters internet access in and out of their network. However even the best firewalls, if not properly configured and implemented, may not provide much protection at all. We so often see organisations compromised by attackers exploiting…
Read More

SIEM as a Service

SIEM as a Service Technicalities now offers (Security Information & Event Management) as a hosted service. Networks that sit behind a firewall appear to be safe, however the firewall (in its basic form) is meant to block incoming and outgoing connections. However, there must be some openings in order to allow in certain traffic such…
Read More

Callback Phishing Avoids Filters

Callback Phishing Avoids Filters A new form of phishing is appearing and it has the ability to avoid email filtering programs. Phishing is the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to entice individuals to reveal personal information, such as passwords and credit card numbers. Unlike…
Read More

Application Whitelisting

Application Whitelisting In today’s digital age, Application Whitelisting has become an increasingly popular security measure. So much so that it is the Number 1 recommendation on the Australian Government’s ‘Essential Eight’ list of recommendations.. The concept behind application whitelisting is simple: Rather than trying to block every potential threat, you simply allow only authorised applications…
Read More

The Importance of Endpoint Detection and Response (EDR)

The Importance of Endpoint Detection and Response (EDR) Endpoint detection and response (EDR) is a crucial element in the modern cybersecurity landscape. As organisations are moving more of their business online and relying on digital data storage and communication, the risk of cyberattacks has increased significantly. Endpoint Detection and Response provides the necessary tools to…
Read More

The Essential Eight

The Essential Eight While it may sound a little boring, and it may never be required, the ‘Essential Eight’ is something that needs to be on every business’ radar. In today’s fast-paced and interconnected world, cyber threats are becoming increasingly sophisticated and frequent. Organizations are at constant risk of losing critical data or being disrupted…
Read More