Archives

About Martin Quinn

Here are my most recent posts

Patch Management: Why it is a Security MUST!

May 22nd, 2017 (No Comments)

by Martin Quinn & Samantha Woollard 21 May 2017 What is Patch Management? Patch management is the process of handling all the updates of components within the companies information system. These include routers, firewalls, servers, operating systems, anti-viruses, along with many more that could exist within a network. After hardware and software is released, flaws […]

How To Use Public Wi-Fi Securely!

April 19th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 17 April 2017 Do you have frequent coffee meetings with colleagues or clients and need to access company information using the cafés free Wi-Fi?  DON’T! Have you ever used free Wi-Fi to log into your online banking? DON’T! Public Wi-Fi is not safe and hackers love to take full […]

Intact Attend Partner Summit To Phuket With WatchGuard!

April 12th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) – 12 April 2017 Who are WatchGuard? WatchGuard are a global provider of Unified Threat Management (UTM) and Next Generation firewall solutions. Their UTM is unmatched providing additional firewall services such as IPS, URL filtering, gateway anti-virus, web blocking and a host of other features. A basic firewall is […]

Most Effective Security Defences Against Hackers According To Hackers!

March 31st, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 27 March 2017 What better way of finding the best counter measures against hackers than asking the hackers themselves. Penetration testers spend their day-to-day life breaking into computer systems and attempting to get around obstacles put in place to stop the bad guys. But why ask penetration testers? The […]

Intact’s Impact At ACSC Conference 2017!

March 23rd, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 20 March 2017 What an exciting few days the Intact Security team had at the Australian Cyber Security Centre conference and we like to think that we stood out! With our bright lab coats and decorated spine, we wanted to highlight the importance of checking your security posture and […]

Top 5 Social Engineering Scams That Employees Fall For!

March 13th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 13 March 2017 After countless employee security awareness programs, presentations, videos, posters and weekly newsletters, are there still successful social engineering scams running riot in your company? Last year 30% of phishing emails were opened and 12% of employees clicked and downloaded the malicious attachment. In 2015, only 23% […]

The Countdown Is On For The ACSC Conference!

March 6th, 2017 (No Comments)

    By Samantha Woollard (Internet Security Specialist) 6 March 2017 The Australian Cyber Security Centre (ACSC) Conference is back and the Intact team are ready to go! This is the conference’s third year and is one of the main security conferences held in 2017; so be sure to attend! The conference starts on the […]

BEWARE: Small Businesses Become A Growing Target

February 27th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 27 February 2017 Small businesses believe that due to their size, they are an unlikely target for cyber attackers. But they could not be more wrong. Perhaps ten years ago, when the chance of attack was much less than present day, it would be acceptable for businesses to think […]

You Have Been Breached, Now What?

February 21st, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 20 February 2017 So you have identified that you are under attack or have already been breached. What should you do now? First of all, breathe. Do not panic. There is a chance it will happen to everyone; it is how severe the attack is that will come into […]

How To Tell If You Are Under Attack!

February 13th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 13 February 2017 35% of all cyber attacks are never detected and 54% of attacks go unnoticed for months, even years, leaving the bad guy to continually access your systems to steal more and more information every day. Not sure if you have been breached? Don’t know how to […]