Security Awareness

What is Security Awareness? Security awareness training is a form of education that seeks to equip members of an organization with the information they need to protect themselves and their organization’s assets from loss or harm. The goal of security awareness training is to arm your employees with the knowledge they need to combat these…

Vulnerability Scanning

Vulnerability Management Businesses need a proactive approach in the management of their operational software, applications, and infrastructure systems. Keeping up with enormous number of security vulnerabilities as they are released is very challenging for most security teams. Security personnel need to be better informed about the raft of potential vulnerabilities and threats that they face,…

Vulnerability Management

Vulnerability Management Businesses need a proactive approach in the management of their operational software, applications, and infrastructure systems. Keeping up with enormous number of security vulnerabilities as they are released is very challenging for most security teams. Security personnel need to be better informed about the raft of potential vulnerabilities and threats that they face,…

Threat Detection

Threat Detection With over 20 million new pieces of malware being produced every 3 months globally, and targeted cyber intrusions across the full spectrum of business and government on the increase, detecting threats and mitigating them is more important than ever. From known threats to unknown new and evolving techniques of malicious attacks and insider…

Patch Management

Patch Management Patch management is the process of deploying an update to a piece of software or computer program to fix, update or improve it, including security vulnerabilities, bugs, usability or performance. One of the great challenges for deploying software updates is the myriad of update mechanisms each software vendor chooses to use to update…

Malware Analysis

Got Malware? Understanding malware is essential to being able to fight it. Malware Analysis gives organisations the information they need to understand these threats. Sandboxing, a form of dynamic analysis, allows an organisation to quickly triage malware by automatically detonating bad/unknown files in a safe, dedicated environment and reporting all behaviour observed during execution. This data produces actionable intelligence which can be used to…

Endpoint Security

Endpoint Security Because your devices no longer sit behind a castle wall What is Endpoint Security? In security-speak, computers and mobile devices are referred to as endpoints. Endpoint security is a concept where each endpoint is responsible for its own security and that remotely connecting to the network creates a potential entry point for security threats.…

Data Sanitisation

Data Sanitisation Ensuring data is clean from unknown, untrusted or trusted sources. What is Data Sanitisation – or otherwise known as Content Disarm and Reconstruct (CDR) There are numerous meanings of data sanitisation depending on the context to which it is being used in.  For the purpose of this article we won’t be discussing the…

Application Whitelisting Solutions

A good way of explaining application whitelisting, or app whitelisting, is that it is like antivirus turned on it’s head. Antivirus solutions have a signature based approach and work by having a database of known bad malware that will not be allowed to execute. Application whitelisting solutions work instead by having a database of trusted…

ASD Top 4 Mitigations

Need to comply with the Australian Signals Directorate’s Top 4? Let Gadget Access  Distribution and our partners help you get there. Application Whitelisting built ground up to address controls in the ISM Patch Management – Verified and rated Enterprise Privileged Account Management The Australian Signals Directorate (ASD) assesses that implementing the Top 4 will mitigate…