top of page

Search
All Posts


Understanding the Importance of Protecting Cloud-Based Data
In today's digital era, businesses rely heavily on cloud services to store and process their data. While the cloud provides flexibility...

Cornerstone Cyber
Jul 34 min read


Why Regular Data Health Checks Are Crucial for Businesses
In today's information-driven world, data has become the lifeblood of every business. It enables informed decision-making, drives...

Cornerstone Cyber
Jul 34 min read


How Online Identity Verification Enhances Security
In our increasingly digital world, ensuring security is more critical than ever. As cyber threats become more sophisticated, the need for...

Cornerstone Cyber
Jul 34 min read


Best Practices for Securing Endpoint Devices
In today's world, where remote work is becoming increasingly common, securing endpoint devices has become a top priority for...

Cornerstone Cyber
Jul 33 min read


Addressing the Intune Policy Reset Bug—A Practical Roadmap
Earlier this month, administrators worldwide discovered that a routine update to Microsoft Intune was inadvertently resetting custom...

Cornerstone Cyber
Jul 32 min read


Enhancing Insider Risk Management with Microsoft Purview
Insider threats; whether malicious or accidental, pose one of the most complex security challenges for modern organisations. Employees...

Cornerstone Cyber
Jul 32 min read


Strengthening Identity Synchronisation with Entra ID’s Application-Based Authentication
Identity synchronisation between on-premises Active Directory and Entra ID (formerly Azure AD) is a cornerstone of modern hybrid identity...

Cornerstone Cyber
Jul 31 min read


Combating Mail Bombing with Defender for Office 365
Mail bombing: A technique where attackers flood email inboxes with massive volumes of spam or malicious messages—can paralyse business...

Cornerstone Cyber
Jul 32 min read


The Rise of Cloud Security Posture Management in Australia
As Australian mid-market organisations steadily shift workloads into Azure, AWS or hybrid clouds, the need for continuous configuration...

Cornerstone Cyber
Jul 32 min read


Zero Trust Myths Holding Back Aussie SMEs
“Zero Trust” has become something of a buzzphrase in modern security, yet many Australian small-to-medium enterprises (SMEs) hesitate...

Cornerstone Cyber
Jul 32 min read


How AI Is Redefining Threat Detection in the ANZ Region
Artificial Intelligence (AI) and Machine Learning (ML) have swiftly progressed from experimental concepts to integral components of...

Cornerstone Cyber
Jul 32 min read


Secure Collaboration Beyond M365: Integrating Third-Party Apps Safely
Microsoft 365 offers a rich ecosystem of first-party and third-party integrations, from CRM connectors to data visualisation tools, that...

Cornerstone Cyber
Jul 32 min read


Insider Risk in Australia: What You’re Up Against
Insider risk remains one of the most challenging facets of enterprise security. In Australia, the Australian Cyber Security Centre’s 2024...

Cornerstone Cyber
Jul 32 min read


M365 Security Myths That Could Be Costing You
Microsoft 365 offers a comprehensive security stack, but pervasive myths can lull organisations into a false sense of safety. Countering...

Cornerstone Cyber
Jul 32 min read


Building Resilience: Cyber Insurance Trends Down Under
Cyber insurance maturity in Australia has entered a new phase. As premiums climb and underwriters demand stronger controls, organisations...

Cornerstone Cyber
Jul 32 min read


Cloud Backup Strategies That Won’t Break the Bank
Reliable backups are the cornerstone of business resilience; yet sprawling cloud environments can quickly drive storage costs skywards....

Cornerstone Cyber
Jul 32 min read


Regulatory Watch: Navigating Australia’s Evolving Privacy Landscape
Australia’s Privacy Act is currently under significant reform, and mid-market organisations must stay ahead of changes that will reshape...

Cornerstone Cyber
Jul 32 min read


The Human Element: Why Security Awareness Is a Business Imperative
Technology alone cannot eliminate cyber risk—human behaviour remains the wildcard. Recent research shows that well-configured controls...

Cornerstone Cyber
Jul 32 min read


Tips for Improving Efficiency with Office 365
Office 365 has transformed the way we work, making collaboration, communication, and productivity easier than ever before. However, to...

Shaun Struik
Jul 33 min read


Integrating AI and Cybersecurity—Microsoft’s Strategic Realignment
Microsoft’s decision to reposition its Chief Information Security Officer (CISO) closer to the Cloud + AI engineering organization marks...

Cornerstone Cyber
Jul 22 min read
bottom of page