News

Everyone can make a difference in detecting a Cyber Attack – Threat Information gathering

Ask yourself, does your organisation collect threat information? How is this done? And is this information being used positively to assist in the detection and identification of a cyber threat or attack? NIST defines Cyber threat information as…” any information that can help an organization identify, assess, monitor, and respond to cyber threats. Examples of…

Brisbane Cyber Security Roundtable Luncheon

Secure ISS recently hosted a Cyber Security Roundtable in Brisbane.   The event was well attended by organisations in the health, transport, financial services, engineering, mining and technology sectors. The topic for the roundtable discussion was “The changing threat landscape. Mitigation, detection and protection strategies”. The key note speaker was Leon Fouche (National Leader Cyber…

Planning for life after Server 2008

Microsoft announce End of Life for Server 2008 and Server 2008 r2 January 14, 2020… …a date that still seems far enough in the future as to not influence day to day operations. However it’s a date that all businesses should be planning for. It is the date that Microsoft will cease providing Security updates…

Secure-ISS Private Cloud 2019 Upgrades

Over the past few months we have been working on infrastructure upgrades to ensure that our private cloud offerings continue to provide great value and the highest performance levels for our customers. We have also upgraded a number of our edge protection devices and core switching across our stack.The upgrades provide benefits to our customers…