
Cyber Security & IT Insights
Expert insights from our team to help you secure and scale your business.

Passkeys: The future of smart passwords
Passkeys offer a more secure and user-friendly alternative for online authentication. So what are they?

Australia's new Cyber Security Bill: what's in it?
The Albanese government recently proposed long-awaited legislation aimed at strengthening the nation's cybersecurity defences.

What is an Attack Surface?
Protect your business from cyber threats by managing your Attack Surface.

Cyber security fundamentals: Are you covering the basics?
Company directors have a responsibility to manage cyber security risk. But where do they start?

Who is responsible for cyber security in a business?
Understanding the roles and responsibilities of cyber security in a business.

Australian 2030 Cyber Security Strategy: What it means for businesses
Implementing the six cyber shields to keep businesses and individuals safe.

Enhance Collaboration with Microsoft Loop
Microsofts new productivity app is now available for 365 users.

How To Spot a Social Engineering Scam
3 Steps to recognise a Social Engineered Scam targeting your business.

Q&A with James: Your Cyber Questions Answered
Autumn 2023 edition: James Bartrop, CEO of ShadowSafe answers your questions.

Strengthen Security with Conditional Access
How to implement access control for critical accounts and systems.

Information regarding the recent Optus cyberattack
Please read if you’re a current or former Optus customer.

Human Risk Management: What it is and why it matters
The new class of user-focused security that increases resilience to sophisticated phishing attacks.

It's time to enable Two-Factor Authentication on everything
Stop 99% of account hacks with this one move.

Secure your .au domain before September 20
What businesses need to do to protect their online property before the .au goes public.

Flubot Malware: What You Need to Know
An Android malware called “Flubot” is spreading across Australian mobiles.

How to train your team for cyber security awareness
Equip your employees with cyber skills at work and home.

99.9% of accounts get hacked because of this one single reason
2021 Cyber-smart tips to protect your accounts and data online.

5 reasons your business needs a phone system
How to stop missing calls and causing frustration with your customers.

