Why You Should Review & Update Your Mobile and Computer Device Policy
When was the last time you looked into your organisation’s mobile device policy?
Essential Eight in Action: What Actually Happens When You Implement This in Your Mobile Device Security Policy
It can be tricky to implement a mobile security policy without disrupting your workforce. Problems arise further when you factor in the rise of hybrid work arrangements and the poor device visibility that arises from them.
AI-Driven Threats Are Getting Faster — Is Your Mobile Device Security Ready?
There have always been security concerns with AI, and one of them has come to the fore in the form of AI-powered attack methods that cut exploitation time in half.
Travel Safety Tips for Mobile Security
Travelling can be exciting, but it also exposes your devices to security risks.
Securing Corporate Devices in the Digital Wallet Era
The Rise of the Digital Wallet Cash, it turns out, may no longer be king. Electronic payment systems, specifically digital wallets, have transformed the way individuals make payments. With tools like Apple Pay, Google Pay, and Samsung Wallet, consumers can now store payment cards, loyalty points, and other credentials digitally.
Why do Australian companies need a mobile phone policy?
When there is no corporate mobile phone policy, don’t complain if employee behavior costs the business - both in reputation and the bottom-line!
What is MDM ? (Mobile Device Management)
What is MDM? (Mobile Device Management) MDM stands for Mobile Device Management. It is a technology solution for securing and managing mobile devices like smartphones, tablets, and laptops. MDM aims to allow organisations to manage and secure the devices and data they use while also improving user productivity.
What is Mobile Identity Management ?
Mobile identity management refers to the process of verifying and managing the digital identity of a mobile user. It involves establishing and verifying the identity of a user accessing mobile applications, services, and resources. Mobile identity management is essential for ensuring mobile users and their data's security and privacy.
Combating phone fraud: have your say on new rules
The ACMA is consulting on proposed new rules to help prevent scammers from targeting high-risk customer interactions with telcos, such as SIM swap requests, changes to accounts and disclosure of personal information.
Iranian Government-Sponsored APT Cyber Actors
FBI and CISA have observed an Iranian government-sponsored APT group that are exploiting vulnerabilities to gain access to systems. The APT group has exploited the same Microsoft Exchange vulnerability in Australia.
3 Strategies to Reduce Telecom Cost










