Category Archives: Blog

10 Steps for Achieving Effective Vulnerability Management

Click to enlarge Today’s threat landscape is not getting any easier to manage. While the number of things you can do to reduce your risk posture is virtually limitless, no organisation we’ve seen has the time or resources to do it all. That’s why it’s important to start with the activities that will have the…
Read more

5 steps to prevent cyber-attacks on your business

In recent years, I’ve seen companies fall victim to a severe cyber-attack or put themselves at risk of one with poor cyber-security practices. And despite the increasing awareness of the consequences, it’s becoming more and more of an issue. One out of every five Australian businesses has been hit by a cyber-attack. In my previous…
Read more

Cyber-attacks: How are Australian businesses being affected?

It’s hard to avoid any mention of cyber-attacks and their severe impacts for Australian businesses, especially when you consider that cybercrime has doubled over the past 12 months. Realistically, it’s only a matter of time before your business is the target of an attack (if it hasn’t experienced one already). From our experience, there are…
Read more

30 years of innovation – The Sundata story

The year was 1986 and the business landscape was vastly different. P.C.s had only been on the market for about four years and email wasn't ubiquitous; you relied on telephones and letters or, if you were lucky, fax machines. The term I.T. entrepreneur didn’t really exist and the term “start-up” wasn’t common at all. The…
Read more

Tackle your data storage needs in 3 steps

Much like death and taxes, incomprehensible data growth is now considered one of life’s certainties. Almost. In our previous blog we talked about how British spies were collecting so much data they couldn’t analyse it all and put lives at risk as a result. And it isn’t just spies who are struggling. A Tech Research…
Read more