Catch up on the latest insights
11 Great Firewall Features (2024 Update)
A firewall should be part of your overall cyber security mitigation strategy. You may think that because you’re not a big bank or Apple your business is safe from hackers, right? Unfortunately not. Many hackers actually target small-to-medium businesses because they...
Scaling Global Operations: How Stanfield IT Empowered Rokt with Seamless IT Solutions
Rokt is the global leader in ecommerce, enabling companies to unlock value by making each transaction relevant at the moment that matters most, when customers are buying. Rokt is headquartered in New York, with offices across North America, Europe, and...
How to Successfully Introduce Two-Factor Authentication To Your Team
Two-factor authentication (2FA): It's a term that every internet user in the 21st century should be familiar with, and for good reason. Given the nature of threats to digital security, 2FA serves as a crucial additional check that ensures users are who they say they...
How to Manage AI Specific Cyber Security Risks in the Finance Industry
Are you ready to tackle the cyber security challenges that come with AI in finance? Let’s face it: AI is revolutionising the finance sector, and it has been for years. But, with tech comes new risks and responsibilities. In this article, we’ll take a look at managing...
How To Identify A Cyber Attack (+ 25 Ways You Can Recover)
Cyber attacks are becoming increasingly common in recent years. While they might sound like scenes from a Hollywood heist film, they are very real threats that businesses face daily. In fact, cybercrime is predicted to cost $10.5 Trillion annually by 2025. Attacks...
What You Need To Know About Malware
Malware is a problem for businesses of all sizes. It can be used to steal personal data, disrupt operations, and cost thousands or even millions of dollars in lost productivity and remediation expenses. Every day, over 450,000 new malicious programs are registered....
How To Create An AI Policy For Your Company (2024)
Wondering if your business needs an AI policy? AI technologies are revolutionising business with automation, insight, and decision-making abilities. And they present boundless opportunities for those who are equipped to use their potential. However, new technology...
Social Engineering: 10 Ways To Protect Your Business
What if I told you that many cyber attacks were largely preventable? Social engineering is not a new phenomenon, yet people in a number of organisation's continue to fall for them. This is because they prey on the on the most vulnerable aspect of security - human...
How to Build A Solid Cyber Security Strategy in 5 Steps
Having a well thought out and correctly implemented Cyber Security Strategy can help businesses avoid a huge amount of damage if they find themselves under attack. Let’s explore the importance of cyber security and how to avoid the sort of security failure that can destroy a company.
10 Of The Best Microsoft Intune Features in 2024
Microsoft Intune isn't your run-of-the-mill endpoint management solution that leaves you with more security questions than answers. Instead, it's easy to grasp, super streamlined, and extremely relevant in the current work from home (WFH) environment. In this article,...
ISO/IEC 42001: What Businesses Need to Know
These days, everyone is talking about AI. But not many are talking about ISO/IEC 42001. AI might seem like a bit of a buzzword. And in many cases it is. One Harvard Business School professor found that 95% of products fail. We’ll likely see the same trend with AI...
The Best 40 Features of Microsoft Teams in 2024
Microsoft Teams is the ultimate tool for collaborating at work. Teams provides a fully decked-out document storage, chat, and online meeting environment. Teams is a key component of Microsoft 365. If you’ve ever needed to participate in a team project at work, you'll...
How Risky Behaviour and MFA Myths are Undermining Cyber Security
The number of cyber incidents caused by human error varies depending on which report you read. But they all have one thing in common. It’s high. A study by IBM estimates that human error is the driving factor in 95% of cyber security breaches. But how can that be?...
Latitude Hack: How To Stop It Happening To Your Business (Updated 2024)
Another day, and another Australian business has suffered a data breach. The Latitude Financial cyber attack hack has once again put the spotlight on the importance of cyber security for businesses. The recent attack also highlights the prominence of cybercrime in...
The Top 22 Cyber Security Audit Checklist Strategies in 2024
Imagine this: your business is thriving, taking advantage of all the opportunities in our increasingly connected world. You're reaching new customers, streamlining processes, and innovating like never before. But wait, what's that lurking in the shadows? Cyber...
4 Emerging Cyber Security Threats Businesses Must Watch Out For
"Cyber threats are constantly evolving" - Every cyber security writer. If you’ve read a few articles on cyber security, there’s no doubt you’ve read the above line. Probably numerous times. But there’s a reason that line persists. It’s because the evolution of cyber...
What You Need To Know About Cybercrime In Australia (2024)
IntroductionCybercrime in Australia is a hot topic, and for good reason. In 2022, two of Australia’s biggest businesses were victims of cyber-attacks. Then, in 2023 we had the Latitude hack. And one thing is glaringly obvious; Australian businesses are not taking...
Stanfield IT: One of Australia’s Top 50 MSPs
We are thrilled to announce that Stanfield IT has been recognised as one of the top 50 Managed Service providers in Australia by Cloudtango for 2024. This recognition is a testament to our team's hard work, dedication, and commitment to excellence in providing...
ISO 27001 Certification in Australia: A Comprehensive Guide
Business data is like a treasure for cyber criminals. So, how do you protect it? With ISO 27001 certification. ISO 270001 is more than just a standard industry requirement; it's a comprehensive framework that elevates your cyber security. It aims to protect your...
Mastering the Cloud: Insights into AWS and Azure for Modern Businesses
The cloud has emerged as a cornerstone of business technology. It has revolutionised how businesses operate and innovate. At the heart of this transformation are two giants: AWS (Amazon Web Services and Azure, Microsoft's cloud platform. These cloud service providers...
17 Reasons Why You Should Use Intune for Mobile Device Management
Are you looking for an efficient solution for your business's mobile device management (MDM)? Microsoft Intune stands as a leading MDM solution that ensures seamless application integration across various devices. And it does so while delivering top-notch security...
7 Ways To Nail Your IT Strategy
In business, your strategy communicates how you will win. Your IT strategy therefore communicates how you will win using technology. It’s about making technology choices that directly impact your company’s market position and operational effectiveness. An effective IT...
Announcing Our New Essential Eight Report
For many business owners and professionals, business security is always top of mind. And for good reason, cyber threats have become a reality of doing business. As we’ve seen in the last 12 months, attackers are targeting data from Australian businesses, big and...
13 Critical IT & Cyber Security Mistakes Your Business Needs To Stop Now
Avoiding cyber security mistakes is a must for any business, but slipping up is often easier than expected. People do all kinds of things that put an organisation’s security at risk. Often without a second thought. These lapses, often due to human error, are a leading...
How To Minimise Third-Party Cyber Risks
Business are increasingly supplementing their operations with a network of third-party vendors. There’s no doubt that this collaboration is vital for growth - many hands make light work. However, these partnerships often harbour vulnerabilities. After all, a chain is...
What You Can Learn From 2023’s Ransomware Attacks in Healthcare
Healthcare organisations are constantly under threat from ransomware. And as our medical institutions become increasingly reliant on technology, the threat of ransomware only grows. Unfortunately, when it comes to healthcare, this creates the potential not just for a...
Navigating the Complex World of Cyber Insurance
Are you thinking of acquiring cyber insurance for your business? Cyber insurance has emerged as an important consideration for many Australian businesses. This relatively new but rapidly evolving form of insurance has quickly become a cornerstone of corporate risk...
6 Advantages of Using a 100% Australia-Based MSP
Technology shapes every business. And many organisations rely on managed service providers (MSPs) to maintain their IT infrastructure. From managing networks and servers to providing round-the-clock technical support, MSPs play a pivotal role in ensuring businesses...
22 Ways You Can Stay On Top Of Your Network Security
What is Network Security? Network security is the practice of protecting your network and its integrity from potential threats. Utilising both hardware and software solutions to manage access to the network, your business’s network security should identify threats and...
DP World Cyber Incident: A Lesson in Business Continuity
The recent cyber attack on DP World Australia, a major global shipping operator, should serve as a lesson for all businesses. In November 2023, the shipping giant was hit by a cyber attack. The breach didn’t just disrupt their operations; it led to a data compromise,...