Insights

Blog
Cybersecurity Strategy

How Much Does Cybersecurity Cost?

Businesses have started to realise the importance of a robust cybersecurity function. So how much does cybersecurity cost?

Cybersecurity Strategy

5 Myths About Cybersecurity In Australia

We take a close look at some of the most common cybersecurity myths. Believing in these myths can put your business at risk, so they’re well worth...

CISO On Demand

Cybersecurity: Outsourced vs In-House

Both in-house and outsourced solutions can develop a comprehensive cyber security plan for your business, so which do you choose?

Monitoring, Detection & Response

What is SOC as a Service? (A Simple Guide)

What is SOC as a service? Find out with this simple guide and discover some of its many benefits. SOCaaS is one of the best ways to protect your...

Proactive Cybersecurity

How to Improve Cyber Security Awareness

The importance of awareness and education when it comes to cyber security and how your business can improve it amongst its employees.

Security Penetration Testing

How Is Penetration Testing Done?

A penetration test is an effective method of simulating a cyber attack on your organisation, but how is it done? This article aims to answer this...

Proactive Threat Hunting Tools & Techniques

Learn how threat hunters identify suspicious activities and behaviors, as well as locate threats that may have already breached a business's systems.

Social Engineering

Understanding Different Types of Hacking

Understanding different types of hacking is the key to developing protocols to keep your business safe from malware, phishing, VoIP hacking & more.

Threat Hunting & Intelligence

What Is Threat Hunting

Threat hunting helps organisations identify security threats that get past their initial endpoint defences. This article explores its benefits.

What is Cybersecurity?

Learn more about cybersecurity and why cybersecurity is important. StickmanCyber can help

Monitoring, Detection & Response

Staying on the Offence: SIEM/SoC Benefits

A proactive approach to cybersecurity is essential. With modern organisations inundated with a variety of threats, you need comprehensive solutions...

Security Penetration Testing

Why Penetration Testing Is So Important

Penetration testing should be a vital part of an organisation's cybersecurity strategy, read this article to find out why it's so important.

Proactive Cybersecurity

Cloud Security. Whose responsibility is it?

We live in the era of cloud computing. Consumer and business computing has been severely influenced by the emergence of cloud computing and cloud...

Cybersecurity Strategy

What is Cyber Security By Design?

Hacking will happen. Being proactive is the only way to stay safe. There is only one way to achieve complete cyber security: by planning ahead.

PCI DSS Compliance

How much does PCI DSS Compliance cost?

Get an accurate estimate of the PCI DSS compliance cost - the different factors that determine total cost, and how to calculate the cost for your...

Cybersecurity Strategy

Why Cyber Security Strategy Is Important

A Cybersecurity Strategy is a plan of action designed to maximise the security and resiliency of your organisation, why is it important?

Cyber Security

Qualified Security Assessor - Quick FAQs

Qualified Security Assessor (QSA) are firms certified by PCI SSC to assess PCI DSS compliance. Here are some of the frequently asked questions about...

Monitoring, Detection & Response

5 Common Misconceptions About The Dark Web

Find out the common dark web misconceptions and know what is the reality about the dark web and how it operates.

Monitoring, Detection & Response

The Dark Web: Everything You Need To Know

Know what is the dark web, what activities happen in the dark web, and in what cases it might be a danger foor your organisation.

Monitoring, Detection & Response

5 Steps of an Effective Incident Response Template

Here is a basic 5-step incident response template that you can use as a base to build your incident response plan customised to your unique business...

Monitoring, Detection & Response

Introduction to Incident Response

Understand what is incident response, its key elements, why it's important and who is responsible for incident response within the organisation.

Threat Hunting & Intelligence

The Threat Intelligence Lifecycle - Explained

Understand the complete threat intelligence lifecycle, from planning to execution and feedback - and know how to do it for your business.

Governance, Risk & Compliance

Key Requirements for APRA CPS 234 Explained

An APRA CPS 234 checklist to give organisations a ready reckoner of all the related requirements they need to keep up with.

Governance, Risk & Compliance

An Introduction to APRA CPS 234

Understand what is APRA CPS 234, understand if it applies to your organisation, and which elements to focus on, to ensure compliance.

Social Engineering

An Introduction to Phishing

Understand one of the oldest social engineering attacks in the book. Know what is phishing, how it evolved, and how to prevent phishing attacks.

Governance, Risk & Compliance

The 22 Cybersecurity Guidelines of the ISM

Understand the 22 key ISM cybersecurity guidelines to help intelligently set up your cybersecurity systems and strategy.

Security Penetration Testing

Why You Need Internal Penetration Testing

Internal networks & applications must be secured against breaches. Here's all you need to know about internal penetration testing & how to get it...

Social Engineering

Social Engineering - A Quick Introduction

Know what is social engineering and how it works. Know the common types of social engineering attacks and how to prevent them.

Security Penetration Testing

An Introduction to Penetration Testing

Proactively identify cybersecurity gaps and fix them before they are exploited by malicious actors - understand what is a pen test & how it's done

PCI DSS Compliance

5 Major Concequences of PCI DSS Non-Compliance

Regardless of how many transactions you handle, PCI DSS is a must. Here are 5 consequences your business might face for PCI DSS non-compliance.

NIST Framework

NIST Framework Functions - Explained

Here's all you need to know about the NIST framework functions - explained by a team that's helping businesses align with the NIST framework

ISO 27001

7 Common Misconceptions About ISO 27001

We take a look at the 7 common ISO 27001 misconceptions and share why it's important and how to simplify compliance and certification proocess

CISO On Demand

4 Major Signs Your Organization Needs a CISO

From complex threat environments t evolving cybersecurity requirements - we dive into 4 key reasons why every organisation needs to have a CISO on...

NIST Framework

An Introduction to the NIST Framework

Know what is the NIST framework, understand its components, and how it can help businesses secure their assets, systems, and processes.

CISO On Demand

10 Key Roles a CISO Plays In an Organization

Understand the CISO role in depth we look at 10 key functions that a CISO performs and how that's crucial to ensuring cybersecurity for your...

Threat Hunting & Intelligence

An Introduction To Threat Intelligence

Know what is threat intelligence when it comes to cybersecurity. Understand why it's important, how it benefits your business and more.

Cyber Security

StickmanCyber - CREST ANZ Member Company

StickmanCyber is a CREST ANZ member company with proven technical capabilities, high quality of service, and a commitment to integrity.

Thought Leadership

There is no Silver Bullet for Cyber Security

A customer recently asked me to obtain written assurance (from a technology vendor) that this vendor’s technology has never been breached and will...

Cyber Attack

Nightmare on DDoStreet

DDoS – Distributed Denial of Service (attack) is similar to road traffic jams during public riots or demonstration that cause gridlocks. In a DoS...

Proactive Cybersecurity

Cyber-Attacks Won’t Happen to Us

The risk of cyber-attacks for small and medium-sized enterprises (SMEs) Many small and medium enterprises are of the misconception that they are an...

Thought Leadership

What is The Impact of Doing Nothing?

During my professional journey as a project manager, I developed several business cases for approval. Most were approved. Some weren’t.

Cybersecurity Strategy

What's up with WhatsApp Cybersecurity?

Consumer-grade mobile applications have recently enjoyed excellent cut-through, whether in the consumer or business worlds.

Cybersecurity Strategy

DevSecOps – The Approach to Security by Design

Understand DevSecOps - what it means, and how it ensures that cybersecurity is baked into the design and deployment of new software products.

PCI DSS Compliance

PCI DSS - Frequently Asked Questions (FAQ)

PCI DSS is to ensure all companies that Process, Store or Transmit credit card information maintain a secure environment and protect cardholder data.

Cyber Security

How Much Should You Invest in Cybersecurity?

Know the cost of cyberattacks, how much businesses spend on average, and which factors to consider when deciding your cybersecurity investment...

Cybersecurity Strategy

Cyber Security – One size does not fit all

Your business has unique requirements & a generic cybersecurity strategy cannot prevent attacks. Here's how the cybersecurity by design approach can...

PCI DSS Compliance

PCI DSS Compliance and the Cloud

A quick look at everything you need to know about PCI DSS compliance in the cloud, and the roles and responsibilities of your client service...

Governance, Risk & Compliance

Impact of EU GDPR Laws on Australian Companies

Europe takes the lead on personal data protection. The changes are coming to Australia, and here’s what you need to know. The world is a global...

 

Optus has been hit with a major cyber attack

In today’s world businesses around the world as well as in Australia, face increasingly sophisticated and innovative cybercriminals targeting what matters most to them; their money, data and reputation. Download our guide to learn everything you need to know about the Optus Data Breach, as well as the nine steps every business around the world and in Australia needs to take to avoid being next.