The Cyber Blog

Standard Post with Image

You’ve Rolled Out Copilot and Created an AI Policy. Security Is Covered, Right? Wrong!

The excitement around AI assistants like Microsoft Copilot is understandable. They promise efficiency, insight, and automation — transforming how staff work and increasing productivity in spades. What’s not to love? ...

Read More
Standard Post with Image

Australia And New Zealand Lag In Ransomware Recovery Despite High Confidence, Crowdstrike Finds

Despite strong confidence in their preparedness, organisations in Australia and New Zealand (ANZ) are among the slowest globally to recover from ransomware incidents, according to findings from Crowdstrike's ...

Read More
Standard Post with Image

British Airways Data Breach – A Cautionary Tale In Cybersecurity & Supply Chain Risk

In June 2018, British Airways (BA) suffered a major data breach due to a chain of avoidable security missteps—ultimately compromising...

Read More
Standard Post with Image

Local Government IT (LGIT) Conference

We had a fantastic time at the recent Local Government IT (LGIT) conference, connecting with IT professionals across local government from all over Australia...

Read More
Standard Post with Image

Backup & Recovery: The Unsexy Solution That Saves The Day

Let’s be honest — backup and recovery rarely make the top of the “cutting-edge tech” list. It doesn’t have the same buzz as AI, Zero Trust, or XDR. It’s often seen as a checkbox — something you set and forget..

Read More
Standard Post with Image

Machine And AI Identities: The Silent Explosion In The Cybersecurity Landscape

As organisations race to modernise their tech stacks—adopting microservices, automation, and AI-driven systems—machine...

Read More
Standard Post with Image

The Identity Management Crisis in Healthcare: Identity Sprawl & Access Abuse

In healthcare environments, identity is everything.It’s the key to accessing patient records, prescribing medications, viewing lab results...

Read More
Standard Post with Image

How Compliance Is Accelerating The Shift To Zero Trust And SASE

As we have mentioned in earlier articles, Cybersecurity compliance isn’t just about passing audits—it’s about enabling secure business operations effectively...

Read More
Standard Post with Image

Secure Access Service Edge (SASE)

So many businesses are adopting hybrid work practices and cloud-first strategies – and with increasingly sophisticated cyber threats, organisations need more...

Read More
Standard Post with Image

Why Identity Is The New Perimeter In A Zero Trust World

Identity & Access Control is Central to Zero Trust. Cloud computing, remote work, and sophisticated cyber threats are rapidly changing the face of the security perimeter...

Read More
Standard Post with Image

Why Zero Trust Architecture is a Business Imperative in 2025

As we evolve how we operate, changing the way we work and how we access our networks, traditional perimeter-based security is no longer sufficient on its own...

Read More
Standard Post with Image

Supply Chain – How To Manage What You Can’t Control

Lack of control over security measures in the supply chain is one of the most pressing issues in cybersecurity today. When organisations...

Read More
Standard Post with Image

A Day in the Life of a Cyber Attack on an Australian Small Business

It Started with a Single Click: How a Brisbane Accounting Firm Lost $120,000 in Hours...

Read More
Standard Post with Image

The Real Cost of a Cyber Breach for SMBs: What the Numbers Say

When most small and mid-sized business (SMB) owners think about cyberattacks, they imagine a scenario that only happens...

Read More
Standard Post with Image

Big Protection, Small Price: Why Partnering with an MSSP Makes Smart Business Sense for SMBs

Many small and medium-sized businesses assume that solid cybersecurity is only for big players with big budgets. But that’s a dangerous myth—and one that’s leaving many SMBs vulnerable...

Read More
Standard Post with Image

Exposed and Unprepared: The Cybersecurity Crisis Facing Australia’s Small Businesses

Cybersecurity isn’t just a concern for big corporations—it’s a critical issue for businesses of all sizes. Yet, more than half of small and medium-sized businesses (SMBs)...

Read More
Standard Post with Image

Are You Ticking a Box or Building a Strategy?

In today's rapidly evolving threat landscape, the difference between surviving and thriving can come down to one question...

Read More
Standard Post with Image

Creating a Welcoming Workplace for LGBTIQA+ Employees

We’re all better off when work feels safe, welcoming, and fair for everyone—no matter who you are or how you identify. That’s why it’s important for workplaces...

Read More
Standard Post with Image

Financial Services, Construction & Manufacturing Beware!

Nitrogen Ransomware Hits Financial Firms in UK, US & Canada – Is Australia Next in Line?...

Read More
Standard Post with Image

The Social Engineering Attack that Brought a Large Retailer to its Knees
Key Lessons from the M&S Ransomware Attack

In May this year, Marks & Spencer—an iconic British retailer—suffered a cyberattack that exposed the personal data of over 9 million customers and employees...

Read More
Standard Post with Image

Have You Considered the Total Cost of Ownership (TCO) of your Firewall?

Having worked with firewalls for nearly three decades, I've come to realise that many people focus solely on the initial cost of the licence or hardware when purchasing a firewall ...

Read More
Standard Post with Image

Cloud: The Expanding Frontier Of Cyber Risk

The use of cloud infrastructure had firmly embedded itself into the core of IT strategies across organisations of every size ...

Read More
Standard Post with Image

The Rising Risks Of AI Misuse And Data Breaches In The Modern Workplace

As artificial intelligence becomes more embedded in both personal and professional settings, concerns about its potential misuse are intensifying ...

Read More
Standard Post with Image

Why Is Healthcare Such A Target For Ransomware?

In Checkpoint’s 2025 Security Report, it was confirmed that Ransomware remained the most significant ...

Read More
Standard Post with Image

What is Industry 4.0?

Industry 4.0—also called the Fourth Industrial Revolution or 4IR—refers to the integration of digital technologies ...

Read More
Standard Post with Image

From Super Funds to the C-Suite

What Every Executive Must Learn From The Australian Super Cyber Attack ...

Read More
Standard Post with Image

Organisations Face Increased Risks

A recent report, 2025 Predictions, by Arctic Wolf Labs, noted a significant increase in business risk in 2025 as threat actors ramped up ...

Read More
Standard Post with Image

Common Types of Attacks

There are a plethora of different attack vectors – all with different functions and varied approaches – so how do you protect your business ...

Read More
Standard Post with Image

Drowning In Alerts? We Hear You!

Alert fatigue occurs when analysts, face an overwhelming number of alerts or notifications ...

Read More
Standard Post with Image

How Diversity and Inclusion Have Strengthened Our Cybersecurity Business

In the fast-evolving world of cybersecurity, staying ahead of threats requires more than ...

Read More
Standard Post with Image

Why Is It So Important To Back Up My M365 Environment?

Backing up your Microsoft 365 (M365), Teams, and SharePoint environments is crucial for several reasons: ...

Read More
Standard Post with Image

Securing Your Remote Workforce In One Simple Step

Securing Your Remote Workforce in one Simple Step – Seccom Global have teamed up with Leading Security Vendor Checkpoint ...

Read More
Standard Post with Image

The Benefits of MXDR For Your Business

In today’s digital world, every business needs a robust Cybersecurity Strategy ...

Read More
Standard Post with Image

Lynx Ransomware – There’s A New Kid On The Block!

Security firm Darktrace has shined light on an emerging ransomware...

Read More
Standard Post with Image

Is Your Backup And Recovery Ransomware Ready?

Protecting your backups from ransomware is essential...

Read More
Standard Post with Image

Finally – a Cyber Security Standard Tailored for Small to Medium Businesses (SMB)

What is the SMB1001 Standard – and why do I want it?...

Read More
Standard Post with Image

Securing your Data – The Critical Role Backup and Recovery Plays in Data Resilience

The critical importance of backup and recovery in any cyber resilience plan cannot be overstated...

Read More
Standard Post with Image

Data Threats Have Evolved - Why Hasn’t Your Backup?

Why Businesses Should Evolve Their Backup Strategy to Seccom Global’s Cloud-First Model, powered by COVE...

Read More
Standard Post with Image

Navigating the responsibility of the dreaded software and firmware upgrade

It certainly appears of late that we are seeing more and more instances where firmware and software updates go horribly...

Read More
Standard Post with Image

Seccom Global Named a Fortinet Engage Tech Support Partner

Seccom Global, a leading Australian Managed Security Services Provider and Fortinet Platinum Partner since 2003...

Read More