VoicePlus Blogs

underline-img
Essential Eight in Action: What Actually Happens When You Implement This in Your Mobile Device Security Policy

Essential Eight in Action: What Actually Happens When You Implement This in Your Mobile Device Security Policy

It can be tricky to implement a mobile security policy without disrupting your workforce. Problems arise further when you factor in the rise of hybrid work arrangements and the poor device visibility that arises from them.

Read More arrow-img
AI-Driven Threats Are Getting Faster — Is Your Mobile Device Security Ready?

AI-Driven Threats Are Getting Faster — Is Your Mobile Device Security Ready?

There have always been security concerns with AI, and one of them has come to the fore in the form of AI-powered attack methods that cut exploitation time in half.

Read More arrow-img
Travel Safety Tips for Mobile Security

Travel Safety Tips for Mobile Security

Travelling can be exciting, but it also exposes your devices to security risks.

Read More arrow-img
Securing Corporate Devices in the Digital Wallet Era

Securing Corporate Devices in the Digital Wallet Era

The Rise of the Digital Wallet Cash, it turns out, may no longer be king. Electronic payment systems, specifically digital wallets, have transformed the way individuals make payments. With tools like Apple Pay, Google Pay, and Samsung Wallet, consumers can now store payment cards, loyalty points, and other credentials digitally.

Read More arrow-img
Why do Australian companies need a mobile phone policy?

Why do Australian companies need a mobile phone policy?

When there is no corporate mobile phone policy, don’t complain if employee behavior costs the business - both in reputation and the bottom-line!

Read More arrow-img
What is MDM ? (Mobile Device Management)

What is MDM ? (Mobile Device Management)

What is MDM? (Mobile Device Management) MDM stands for Mobile Device Management. It is a technology solution for securing and managing mobile devices like smartphones, tablets, and laptops. MDM aims to allow organisations to manage and secure the devices and data they use while also improving user productivity.

Read More arrow-img
What is Mobile Identity Management ?

What is Mobile Identity Management ?

Mobile identity management refers to the process of verifying and managing the digital identity of a mobile user. It involves establishing and verifying the identity of a user accessing mobile applications, services, and resources. Mobile identity management is essential for ensuring mobile users and their data's security and privacy.

Read More arrow-img
Combating phone fraud: have your say on new rules

Combating phone fraud: have your say on new rules

The ACMA is consulting on proposed new rules to help prevent scammers from targeting high-risk customer interactions with telcos, such as SIM swap requests, changes to accounts and disclosure of personal information.

Read More arrow-img
Iranian Government-Sponsored APT Cyber Actors

Iranian Government-Sponsored APT Cyber Actors

FBI and CISA have observed an Iranian government-sponsored APT group that are exploiting vulnerabilities to gain access to systems. The APT group has exploited the same Microsoft Exchange vulnerability in Australia.

Read More arrow-img
Critical vulnerability present in certain versions of Microsoft Excel

Critical vulnerability present in certain versions of Microsoft Excel

Microsoft has identified active exploitation of a vulnerability in Microsoft Excel. Affected Australian organisations should apply the available security update as soon as possible.

Read More arrow-img
  • 1
  • 2

3 Strategies to Reduce Telecom Cost