Posts by John Reeman
FREE Resource Kit for Ransomware Awareness Month in July
Weโre here to help you and your users stay secure from the scourge of ransomware for Ransomware Awareness Month this July with a kit full of free resources!
Read MoreThird Party Supplier Risk 76 security questions to ask
Anyone who has ever been involved in a Third Party Risk Assessment (TPRA) will know it can be an arduous job!ย Often, questionnaires are supplied either: Through a third party web portal ( multiple forms and sometimes over 700 questions ) Excel spreadsheet (with multiple sheets and sometimes over 300+ questions) After weeks or even…
Read MoreThird Party Risk Assessments, What you need to know
Safeguarding Your Business in Today’s Threat Landscape In today’s rapidly evolving threat landscape, safeguarding your business from potential risks is more critical than ever. Third-party risk assessments play a vital role in ensuring the security and integrity of your operations. By evaluating the security practices and vulnerabilities of your business partners, suppliers, and vendors, these…
Read MoreVulnerability Management Metrics: How to be effective
๐Implementing a robust Vulnerability Management Program is a critical step in strengthening your organisation’s cyber defences. But how do you determine its effectiveness? Success cannot be measured merely by the number of vulnerabilities identified or patches applied.๐ Key metrics can provide a clear picture of your program’s performance and effectiveness. Here are a few critical…
Read MoreData Privacy: What is Personally Identifiable Information (PII)?
What is Personally Identifiable Information (PII) In a world where personal information is constantly being shared and disseminated online, protecting your privacy has become more important than ever. Understanding what constitutes Personally Identifiable Information (PII) is crucial in safeguarding your sensitive data. From your name and address to your superannuation number and banking details, PII…
Read MoreVirtual CISO for hire: Build cyber security resilience
As cybersecurity threats continue to evolve and become more sophisticated, organizations must stay one step ahead to protect their valuable data and assets. In today’s digital landscape, the role of a Chief Information Security Officer (CISO) is vital in ensuring the security of an organization’s systems and information. However, not every organization has the resources…
Read MoreDemystifying an IRAP Assessment: Everything You Need to Know
Are you a business owner looking to understand the ins and outs of the IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security…
Read MoreData Privacy in Australia: Safeguard Your Personal Data
Data privacy has become a critical concern for individuals and businesses in an increasingly interconnected digital world. Nowhere is this more evident than in Australia, where safeguarding online information is paramount. With cyber threats increasing and data breaches becoming more frequent, protecting sensitive data has become imperative for Australians. In this article, we delve into…
Read MoreWhy having a Virtual CISO is important for your business?
Virtual CISO Services Australia ๐ผ Small to medium-sized businesses (SMBs) often underestimate their vulnerability to cyber threats, primarily because they lack the necessary tools and expertise to protect against these risks. That’s where a ๐๐ข๐ซ๐ญ๐ฎ๐๐ฅ ๐๐๐๐ (Chief Information Security Officer) comes into play! ๐ผ A Virtual CISO is not only a cost-effective solution, but they…
Read MoreHow to build a successful cybersecurity program
In this video I will be taking you through a cybersecurity framework that I have developed and perfected over the last 25 years to help organisations build strong cybersecurity programs, reduce risk and remain safe. Ready to find out more? Book in a Call
Read More