Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX
teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.
Why an Effective Security Strategy Requires Three Pillars
The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole. Such an approach is concerning for a number of reasons. It makes effective management difficult to achieve because IT teams need to monitor and...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice
Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following...
How to Protect Your Legal Practice from Payment Redirection Fraud
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing...
Is Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are...
How you can protect your Microsoft Exchange email service from cyber attacks
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are...
Zooming Around
How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
Podcast Episodes