The current threat landscape is rapidly advancing, with cybercriminals constantly upgrading their toolset to break through security defenses. If you want to outsmart malicious hackers, it’s time to start thinking like them. Fend them off with various layered defense methods. This is what Defense in Depth (DiD) is all about. The National Institute of Standards and Technology (NIST) defines DiD as “The application of multiple countermeasures in a layered or stepwise manner to achieve security objectives. The […]
READ MOREMercury IT Cybersecurity Roadmap Series
Join Chris Haigh, Chief Information Security Officer (CISO) at Mercury IT as he provides an overview of the Mercury IT Cybersecurity Roadmap in these three short videos. Part One: An overview of level 1, Initial and Developing your Roadmap which includes technology risk assessment, tightening the basics and defence in-depth. Learn more here […]
READ MOREHow to Build a Security-First Culture That Empowers Your Hybrid Workforce
Tools are only as good as their users. This should be your guiding philosophy as the world shifts to a hybrid work model to deal with the complexities posed by the COVID-19 pandemic. While it’s great to define and implement essential security controls and tools, if it isn’t backed up by workforce buy-in and participation, […]
READ MORE4 Reasons Cybersecurity Attack Surfaces Are Expanding
The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape increased at an unprecedented pace. Some of the trends that powered these changes and […]
READ MORECyber Insights with Mercury IT- July 2021
Welcome to Cyber Insights with Mercury IT. This month we focus on latest breaches, top cybersecurity tips and the impact of payment redirection scams in Australia. CURRENT SCAM Payment redirection scams cost Australian businesses $128 million in 2020 Payment redirection scams were the most financially damaging scams for Australian businesses in 2020 according to the ACCC’s […]
READ MOREDo You Know Your Digital Risk?
Rapid technological advancement and rising global connectivity is reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organisations increasingly vulnerable to digital risks. However, […]
READ MOREAdopt Zero Trust Security for Your SMB
With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead to severe breaches that can damage your business. Zero Trust […]
READ MORECyber Insights with Mercury IT- June 2021
Welcome to Cyber Insights with Mercury IT. This month we focus on latest breaches, top cyber security tips and the most recent report from SCAMWATCH illustrating the impact of scams on Australians in 2020. LATEST BREACHES: Waikato District Health Board – New Zealand Waikato District Health Board (DHB) had most of its IT services go […]
READ MORETech & Cocktails Event
Mercury IT recently hosted a Tech & Cocktails Luncheon at La Costa Restaurant and Bar, Fortitude Valley as part of our new “TECH AND CONNECT” event series focused on connecting people, businesses and technology… the critical components to future growth. CONNECT: with likeminded business leaders and professionals LEARN: the latest technology trends and innovations […]
READ MORETop 9 IoT-Related Security Threats Businesses Face
The Internet of Things (IoT) is rapidly changing the technology landscape as we know it. Businesses worldwide are leveraging IoT for benefits such as seamless collaboration, access to comprehensive data and the ability to make stronger business decisions based on insights derived from substantial data. Experts estimate the total number of installed IoT-connected devices worldwide […]
READ MORE