The Cyber Blog

Standard Post with Image

Cloud: The Expanding Frontier Of Cyber Risk

The use of cloud infrastructure had firmly embedded itself into the core of IT strategies across organisations of every size ...

Read More
Standard Post with Image

The Rising Risks Of AI Misuse And Data Breaches In The Modern Workplace

As artificial intelligence becomes more embedded in both personal and professional settings, concerns about its potential misuse are intensifying ...

Read More
Standard Post with Image

Why Is Healthcare Such A Target For Ransomware?

In Checkpoint’s 2025 Security Report, it was confirmed that Ransomware remained the most significant ...

Read More
Standard Post with Image

What is Industry 4.0?

Industry 4.0—also called the Fourth Industrial Revolution or 4IR—refers to the integration of digital technologies ...

Read More
Standard Post with Image

From Super Funds to the C-Suite

What Every Executive Must Learn From The Australian Super Cyber Attack ...

Read More
Standard Post with Image

Organisations Face Increased Risks

A recent report, 2025 Predictions, by Arctic Wolf Labs, noted a significant increase in business risk in 2025 as threat actors ramped up ...

Read More
Standard Post with Image

Common Types of Attacks

There are a plethora of different attack vectors – all with different functions and varied approaches – so how do you protect your business ...

Read More
Standard Post with Image

Drowning In Alerts? We Hear You!

Alert fatigue occurs when analysts, face an overwhelming number of alerts or notifications ...

Read More
Standard Post with Image

How Diversity and Inclusion Have Strengthened Our Cybersecurity Business

In the fast-evolving world of cybersecurity, staying ahead of threats requires more than ...

Read More
Standard Post with Image

Why Is It So Important To Back Up My M365 Environment?

Backing up your Microsoft 365 (M365), Teams, and SharePoint environments is crucial for several reasons: ...

Read More
Standard Post with Image

Securing Your Remote Workforce In One Simple Step

Securing Your Remote Workforce in one Simple Step – Seccom Global have teamed up with Leading Security Vendor Checkpoint ...

Read More
Standard Post with Image

The Benefits of MXDR For Your Business

In today’s digital world, every business needs a robust Cybersecurity Strategy ...

Read More
Standard Post with Image

Lynx Ransomware – There’s A New Kid On The Block!

Security firm Darktrace has shined light on an emerging ransomware...

Read More
Standard Post with Image

Is Your Backup And Recovery Ransomware Ready?

Protecting your backups from ransomware is essential...

Read More
Standard Post with Image

Finally – a Cyber Security Standard Tailored for Small to Medium Businesses (SMB)

What is the SMB1001 Standard – and why do I want it?...

Read More
Standard Post with Image

Securing your Data – The Critical Role Backup and Recovery Plays in Data Resilience

The critical importance of backup and recovery in any cyber resilience plan cannot be overstated...

Read More
Standard Post with Image

Data Threats Have Evolved - Why Hasn’t Your Backup?

Why Businesses Should Evolve Their Backup Strategy to Seccom Global’s Cloud-First Model, powered by COVE...

Read More
Standard Post with Image

Navigating the responsibility of the dreaded software and firmware upgrade

It certainly appears of late that we are seeing more and more instances where firmware and software updates go horribly...

Read More
Standard Post with Image

Seccom Global Named a Fortinet Engage Tech Support Partner

Seccom Global, a leading Australian Managed Security Services Provider and Fortinet Platinum Partner since 2003...

Read More