Welcome to the CommSec Blog
Understanding Incident Response and Digital Forensics
Explore the differences and synergy between Incident Response and Digital Forensics in cybersecurity, and learn [...]
Read more
27
Aug
Aug
The Role of GRC Tools in Modern Compliance
Discover how GRC tools streamline compliance, reduce manual tasks, and enhance risk management with continuous [...]
Read more
22
Aug
Aug
The NIS2 Directive Uncovered
Discover the essentials of the EU's NIS2 Directive and its impact on cyber security. Learn [...]
Read more
22
Jul
Jul
The Dark Side of AI: A New Era of Cyber Threats
Explore the dark side of AI in cybersecurity – from sophisticated social engineering scams to [...]
Read more
05
Jul
Jul
How Alert Monitoring Can Transform Your IT Security
Imagine hackers inside your network for a week before you even notice. That is the [...]
Read more
18
Jun
Jun
Engaging the Board to Build Cyber Resilience
Learn how to get board buy-in for cybersecurity initiatives by focusing on the business impact [...]
Read more
10
Jun
Jun
The Hidden Threats of Browser Extensions
Uncover the hidden dangers of malicious browser extensions lurking in your web browser. Learn how [...]
Read more
16
May
May
Making the Most of Your Penetration Test Report
A pen testing report offers more than just a list of vulnerabilities. This blog post [...]
Read more
11
Apr
Apr
Compliance Made Easy with Powerful Password Management
Stressed about IT compliance for password management? A Password Manager helps IT teams simplify compliance [...]
Read more
13
Mar
Mar
Inspiring Inclusion in Cyber Security on International Women’s Day
To highlight International Women’s Day, we sat down with Meghana, an experienced SOC Analyst at [...]
Read more
07
Mar
Mar
Enhance Email Security and Deliverability with DMARC
Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that helps organizations [...]
Read more
31
Jan
Jan
World Data Protection Day 2024: Latest Developments in Data Privacy
As we recognise Data Protection Day today, we're committed to helping businesses navigate the evolving [...]
Read more
25
Jan
Jan
From Social Engineering to AI Powered Threats: Part 1 2023 in Review
In the ever-evolving world of cybersecurity, 2023 was a year marked by both challenges and [...]
Read more
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 2 Top Cybersecurity Tips
In this blog post, we asked our experts to rank the most common cybersecurity measures [...]
Read more
20
Dec
Dec
From Social Engineering to AI Powered Threats: Part 3 Predictions for 2024
In this blog post, our frontline cybersecurity people share their insights, providing valuable perspectives on [...]
Read more
20
Dec
Dec
Navigating Endpoint Security: Comparing Microsoft Defender and Sophos Intercept X
This blog post compares and contrasts Microsoft Defender for Endpoint and Sophos Intercept X, two [...]
Read more
22
Nov
Nov
Cyber Crime – Google Search Engine Result Poisoning
Introduction Google search engine result poisoning is a type of cyber attack in which attackers [...]
Read more
10
Nov
Nov
How a 24/7 SOC service can help with compliance for NIS2 and DORA
One of the key requirements of NIS2 is that organisations must have a process for [...]
Read more
24
Oct
Oct
Cyber Resilience and Risk Management Top 10 Takeaways
Cyber security is a critical issue for businesses of all sizes, and it is important [...]
Read more
16
Oct
Oct
Cyber Security Month October 2023
October is Cybersecurity Awareness Month, and CommSec are committed to helping our customers stay safe [...]
Read more
02
Oct
Oct
Antivirus Versus Outsourced Cyber Security for Small Business
Antivirus vs. Outsourced Cyber Security: Which is the Best Investment for Your Small Business? If [...]
Read more
27
Sep
Sep
The Anatomy of a Third-Party Data Breach
Third-party partnerships have become a cornerstone of modern business operations, but they also introduce security [...]
Read more
12
Sep
Sep
DLP: How to Protect Your Data from the 3 Biggest Risks
Protecting Your Organisation’s Data with DLP In the wake of the recent massive data breach [...]
Read more
30
Aug
Aug
How to Secure Your Microsoft 365 Environment
Securing your M365 Environment: A Guide for Business Microsoft 365 (M365), formerly known as Office [...]
Read more
20
Jul
Jul
Why You Should Consider DPO-as-a-service for Your Business
In an age dominated by data and technology, protecting the privacy and security of personal [...]
Read more
12
Jul
Jul
Protect Your WordPress Website: Unveiling Vulnerabilities and Preventing Exploits
In today’s digital landscape, ensuring the security of your WordPress website is paramount. Hackers are [...]
Read more
12
Jun
Jun
Secure Your Cloud: Get a Cloud Security Assessment
The cloud has revolutionised the way businesses operate by providing them with a cost-effective and [...]
Read more
10
May
May
The Importance of Incident Containment during a Cyberattack
The containment phase is a critical aspect of the Incident Response plan during a cyberattack. [...]
Read more
28
Apr
Apr
The Essential Guide to Cybersecurity for Small and Medium-Sized Enterprises (SMEs)
Protect your business and customers' data with our 12-step guide to enhancing your SME's cybersecurity [...]
Read more
18
Apr
Apr
Why Penetration Testing is Essential for Business Security in 2023
In today's digital age, cybersecurity threats are constantly evolving, and it's becoming increasingly difficult for [...]
Read more
06
Apr
Apr