Bluestone News
We understand the world of IT may be confusing. Our experts are here to lead the way and share their knowledge with you.
Featured news article
Filter Bluestone News
Cyber security and cyber resilience – seem similar but mean different things. Do you know the difference?
Whilst they are often used interchangeably - they mean quite different things, and we’re setting the record straight and, more importantly, sharing what you need to be across right now.
Read articleThe power of a presumptive breach
Being prepared means you’re 2.5 times more likely to ensure 99.99% uptime for business critical applications[1], so it makes good business sense. As our understanding of cyber security increases, so does the realisation that security is an ongoing journey, not an end destination.
Read articleThey say prevention is better than a cure; the same goes when protecting your data from threats.
We are all well aware that when it comes to protecting your data in the event of a cyber-attack or breach, it pays to be proactive. However, most of us are battling skills and resource shortages, making this a real challenge despite our best efforts.
Read articleYour compass to cybersecurity. Get your protection heading in the right direction
The Australian Signals Directive (ASD) has put together the Essential 8 as a ‘series of baseline mitigation strategies’ that businesses can implement within their cyber security frameworks. Even if used as a minimum security measure, it can help reduce the chances of being hit by a cyber attack.
Read articleEssential 8: MFA – security for a hybrid workforce
How the Essential Eight is practically applied depends on the maturity level of the organisation, with more complex organisations requiring more comprehensive safeguarding measures. However, as the name suggests – all eight of these measures are essential in establishing a cyber security baseline.
Read articleEssential Eight: Backups – Why Proactivity is the Ultimate Defence
Most of us have endured the experience of losing our personal data at one time or another. We’d see our device’s backup call-to-action, tell ourselves we’d “do it tomorrow”, and some time down the track, our device would crash or go missing – taking with it our treasure trove of files.
Read article