- A picture is not always worth a thousand wordsRead More: A picture is not always worth a thousand words- A picture is not always worth a thousand words, cyber security vendors please take note Question: When is a picture NOT worth a thousand words? Answer: When it has no context Just like my photo, it has no context and therefore would by of little interest to anyone who wasn’t on the same trail with me… 
- From Backup to resilient cyber securityRead More: From Backup to resilient cyber security- In the Beginning From Backup to resilient cyber security: Best practises for Information Technology such as “Least privilege access”, “Admin account segregation”, “Operating system patching”, “Multi-factor authentication”, even “Patching and updating applications” have been around for many years, undertaken as ritual by many Information Technology departments within businesses across Australia as best practise maintainence, without… 
- Four actions for protection with Microsoft Defender for EndpointRead More: Four actions for protection with Microsoft Defender for Endpoint- Four actions for protection with Defender for Endpoint: Originally written by myself for Crayon and sharing here to help other organisations move past Endpoint Detection and response into preventative technologies to improve your security posture. Introduction Often I am asked the question, “Why should I use Defender for Endpoint, I use product ‘X’ and Product… 
- CVE-2023-23397: Microsoft outlook vulnRead More: CVE-2023-23397: Microsoft outlook vuln- CVE-2023-23397: Microsoft Outlook Vuln: elevation of privilege vulnerability leads to NTLM credential theft: Very quick and short post today, I have already been contacted today around mitigations for this vulnerability and wanted to get some quick steps out early incase your business is unsure how to check whether you are at risk. My post assumes… 
- 101: Basic Security Posture for WordPressRead More: 101: Basic Security Posture for WordPress- 101: Basic Security Posture for WordPress, WordPress is one of the most popular internet technologies in use today, as a tool for amateur and professionals wanting to blog, to sell, to consult or to do almost anything else, nothing comes close to the WordPress ecosystem for flexibility and extensibility – want to build a store… 
- 101: Introducing Microsoft Defender for EndpointRead More: 101: Introducing Microsoft Defender for Endpoint- 101: Introducing Microsoft Defender for Endpoint, one of my favourite role functions is to talk with customers about Microsoft security, of course I like to speak about security in general as well but Microsoft do a really great job covering 80% of what organisations need from a cyber security perspective so I almost always start… 
- Microsoft Sentinel – reducing spend and log complexity firstRead More: Microsoft Sentinel – reducing spend and log complexity first- Microsoft Sentinel – reducing spend and log complexity first, Microsoft sentinel is one of the easiest SIEM platforms to switch on and be usable without configuration. But the devil is in the details of what should be configured to ensure that the signal data being ingested is most useful, minimally duplicated and at the lowest… 
- Secure Cloud Business Applications – assess your securityRead More: Secure Cloud Business Applications – assess your security- Secure Cloud Business Applications, assess your security – Best of all it is at no cost and provides guidance on best practise security guidelines for business. When reducing the likelihood of a successful cyber attack we need to break down the approach into various elements, a security assessment such as the CISA SCUBA tool is… 
- Protecting Australian Business from Cyber CrimeRead More: Protecting Australian Business from Cyber Crime- Protecting Australian Business from Cyber Crime, easy title to write and a topic beyond complex to implement for many small to mid sized businesses in 2022, Australia. The secret is that it is not complex to get started on a cyber security journey, it is easy to do the basics and reduce the risk of… 
- As Secure As Practical (ASAP)Read More: As Secure As Practical (ASAP)- As Secure As Practical (ASAP) – As Soon As Possible. In the past few months of 2022 in Australia alone there have been a number of significant cyber breaches across many of our major brand names and this terrible trend is poised to continue to get worse until such time as our organisations uplift their… 











