Bluestone News
We understand the world of IT may be confusing. Our experts are here to lead the way and share their knowledge with you.
Featured news article
Filter Bluestone News
Is your retail IT infrastructure primed for the peak season? Here are 5 tips for success.
Whether you’ve already got your solutions in place for the silly season or you’re just starting to get to grips with your retail operation’s changing needs for better efficiency, we wanted to share our top actions for building a strong IT infrastructure that will support your retail success as we gear up for the 2022 peak period and launch into 2023.
Read articleCyber security and cyber resilience – seem similar but mean different things. Do you know the difference?
Whilst they are often used interchangeably - they mean quite different things, and we’re setting the record straight and, more importantly, sharing what you need to be across right now.
Read articleThe power of a presumptive breach
Being prepared means you’re 2.5 times more likely to ensure 99.99% uptime for business critical applications[1], so it makes good business sense. As our understanding of cyber security increases, so does the realisation that security is an ongoing journey, not an end destination.
Read articleThey say prevention is better than a cure; the same goes when protecting your data from threats.
We are all well aware that when it comes to protecting your data in the event of a cyber-attack or breach, it pays to be proactive. However, most of us are battling skills and resource shortages, making this a real challenge despite our best efforts.
Read articleYour compass to cybersecurity. Get your protection heading in the right direction
The Australian Signals Directive (ASD) has put together the Essential 8 as a ‘series of baseline mitigation strategies’ that businesses can implement within their cyber security frameworks. Even if used as a minimum security measure, it can help reduce the chances of being hit by a cyber attack.
Read articleEssential 8: MFA – security for a hybrid workforce
How the Essential Eight is practically applied depends on the maturity level of the organisation, with more complex organisations requiring more comprehensive safeguarding measures. However, as the name suggests – all eight of these measures are essential in establishing a cyber security baseline.
Read article