Cyber Risk Psychology with Andrew Reeves
Exploring cyber security fatigue, advice fatigue, employee attitudes and the risks they pose in business. Andrew explains how to recognise and acknowledge the challenges and barriers without having negative stigma and emotions in businesses? Andrew provides insight about human motivators and value…
Cloud Security with Martin Thurgate
Everyone is using ‘the cloud’ but what does this mean? Why should we be concerned about cloud security? What is the importance of cloud security? Martin discusses reliability and trust around social media and microsoft365 in regard to cloud security. You will learn about IT provider services, benef…
Cyber security insurance with Troy Filipcevic
Imagine your business is on a successful pathway and growing by the day, then a breach occurs from one minor mistake via an email request from yourself of from an employee. Now imagine your now unable to sell products and your brand reputation is at stake, what do you do? What have you got in place…
Cyber Security Risk Score with Susie Jones
Susie is an entrepreneur, co-founder and a CEO who holds an extensive range of knowledge and industry experience within cybersecurity. In this chat we learn what is meant by a cybersecurity risk score, why this is important to understand in business and how understanding this is beneficial for gov…
Providores and International supply chain with Jonathan Kempe
What systems and processors are in place for your business if you are exporting food and other supplies globally? How can a business stand out and have a competitive advantage in the providore market? Jonathan discusses risk assessment practices and explains supply chain disruptions and the ripple …
Porting and safe storage of customer information with Hector Lucenti
Learn about what porting mobile numbers are, who can this happen too? More importantly how to be aware and protect personal data within the cyber and business landscape. Hector will help us understand porting and how to be aware of protecting your client and personal information, there are some key…
Top priorities for business emails with Georgia Turnham
Business Email Breaches (BEC) are unfortunately common and can be minimised Georgia discusses ransomware, malware, and phishing. Learn the first steps in prevention of breaches, recognising breaches, human factors, strategies, and controls to protect your valuable business emails and data.
Assessing cybersecurity posture in business with Jason Murrell
Podcast series of 8 episodes addressing key issues businesses face with cyber security, this should not be ignored and should be taken as an opportunity to grow and mitigate potential threats. Each episode will hear from key cyber security industry experts on the topics including cyber security thr…
Public Health Orders and your Small Business
It's now time for us as business owners to get across the public health orders and review and implement changes, again, to our working business model to ensure we operate our businesses in accordance with the Public Health Orders as set out along the NSW Governments Roadmap for easing restrictions.…
The Culture of Cybersecurity for SMEs
Cybersecurity is about more than tech, its about how a team works together to protect their organisation and their customers, its about the culture of the organisation •Simple steps to put in place to protect business. •Introduction to cyber security tools and templates •Introduction on cyber se…