Blog

Feb 27 2024

Australian First: Holocron Sentry – SMB Cyber Security

Discover how Holocron Sentry can fortify your small to medium-sized business with robust cyber security protection. Designed exclusively for SMBs, this revolutionary service offers 24/7 monitoring against cyber threats, including ransomware, malware, and data…
Feb 06 2024

Your Phone, Your Fort: Securing the Key to Your Digital Kingdom

Discover how smartphones, the cornerstone of our personal and business lives, are emerging as prime targets for cyber threats. From the surge in mobile banking attacks to the evolution of phishing scams, Holocron Cyber…
Dec 22 2023

Understanding the “Play” Ransomware: A Guide for the Everyday User 

Play ransomware is a growing cyber threat that encrypts files and demands a ransom. It has affected over 300 organizations, including essential services….
Dec 07 2023

Fortifying Cyber Defences: The Critical Role of Human Error and Training

In an era of rapidly evolving cyber threats, a significant yet often-overlooked vulnerability looms large – the human factor. While technology advancements fortify cyber defences, the human element remains both a crucial asset and…
Oct 13 2023

Password Best Practices: Creating and Managing Strong, Secure Passphrases

One of the fundamental aspects of your online defence is password security. Passwords serve as the first line of defence against unauthorised access to your sensitive data. In this article, we’ll delve into the…
Aug 30 2023

Protecting Your Business from Email Compromise: A Closer Look at BEC and Phishing

In today’s fast-paced digital environment, ensuring the security of your business communications has become more crucial than ever. Business Email Compromise, or BEC, is emerging as a dominant threat in this landscape. And often,…
Aug 10 2023

An In-Depth Look at ISO 27001 Certification and why every forward-thinking company should consider it

In today’s digital landscape, cyber security is of paramount importance for businesses and organisations of all sizes. The ISO 27001 certification serves as a vital standard for information security management systems (ISMS), ensuring that…
Jul 31 2023

BYOD: Understanding the Risks of Bring Your Own Device to Work

Employees are increasingly using their personal devices, such as smartphones, laptops, and tablets, to access work-related applications and data. This trend, known as Bring Your Own Device (BYOD), has many benefits for both employers…
Jul 12 2023

Enhancing Organisational Resilience by Implementing Disaster Recovery and Cyber Incident Response Plans

In today’s increasingly interconnected and digitised business landscape, the importance of disaster recovery and cyber incident response planning cannot be overstated. Small to medium enterprise in Australia face a myriad of potential risks, ranging…

Talk to a cyber security expert today and secure your systems & data

Talk to one of our leading cyber security experts today, about how we can help you mitigate threats and safeguard your business.

30 min. consult with a trusted security expert

Book a Consultation

"*" indicates required fields

This field is for validation purposes and should be left unchanged.