Glenn Makowski

How well do you know the insider threat? Start the quiz to find out!

How well do you know the insider threat? Current or former staff, contractors, suppliers, or a trusted business partner, who has or has had authorised access to the organisation’s assets can cause major security problems that threaten a company’s brand and reputation. Measure your knowledge of stolen secrets, data breaches espionage, fraud and network sabotage. […]

How well do you know the insider threat? Start the quiz to find out! Read More »

Protecting businesses from insider threats with machine learning

Employing user behaviour analytics to detect internal threats. Machine learning and AI are the latest tools being utilised by businesses to help prevent cybercrime and stop cyberattacks. However, what if these same tools could be used to help stop insider threats such as employees leaking or misusing company data? TechRadar Pro spoke with Jazz Networks’ CEO Hani Mustafa who

Protecting businesses from insider threats with machine learning Read More »

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself

Our CommuniCloud Managing Director, Glenn Makowski, was invited to share his knowledge at the 2019 Olive Conference and Trade Exhibition at Albury Entertainment Centre.   Taking place over the 17th to 19th of October, the industry event allowed Glenn to put forward the goings on at CommuniCloud, where we have begun to include cyber-security options as

Highlight of the 2019 Olive Conference on Cyber Security threat landscape and what can you do to protect yourself Read More »

Free 30 minutes ISO 27001 Essentials Webinar

Implementing an ISO27001 compliant Information Security Management System (ISMS) can be an intimidating task, especially if one has no prior knowledge of the Standard. An ISMS is a systematic approach to managing risks related to valuable information assets (organisation information) to ensure it remains secure. This approach includes people, processes and systems. An ISMS preserves the confidentiality,

Free 30 minutes ISO 27001 Essentials Webinar Read More »

The Threat of Spear Phishing: How to prevent attacks

Cybercriminals used to rely on broad spam attacks with limited success. Unfortunately, times have changed. Today, highly-targeted email phishing schemes are penetrating the IT systems of major organisations around the world, leading to massive data hacks and security breaches. If it feels like high-profile cyber crimes are in the news every day, it’s because they

The Threat of Spear Phishing: How to prevent attacks Read More »

How cyber threat intelligence sharing can benefit the government sector

Cybercriminals operate at incredible speed. Meaning that today, defending local government networks from cyber attacks is an ever-evolving battle that never stops. Cyber threats, including hackers, proxy groups and threat actors can take advantage of system vulnerabilities within days of them being discovered, and successful techniques will rapidly spread among criminal communities. Scary, right? With

How cyber threat intelligence sharing can benefit the government sector Read More »

8 Best practice tips to help overcome your cyber security challenges

By restricting the number of operating systems and applications that have admin access, you can greatly reduce your risks. Why? Well, admin accounts hold all the keys, so an attacker only needs to get access to one admin login, and they can do a lot of damage. It’s also sensible to regularly review your admin

8 Best practice tips to help overcome your cyber security challenges Read More »