Sentrian Insights

Security

Boost Your Cybersecurity with Sentrian Cyber Awareness Risk Management (CARM)

In today’s fast-paced digital world, cyber threats are on the rise, and businesses of all sizes are vulnerable. For small and medium enterprises (SMEs), a single cyber incident can have especially devastating financial and reputational consequences. While it’s important to invest in cybersecurity technology and software, it’s equally as important to focus on staff awareness of potential risks and threats.

Sentrian Expert Answers Your Cybersecurity Questions

Cybersecurity is a broad field that encompasses much more than just installing antivirus software. Sentrian Expert Phil explains it involves a comprehensive approach that includes user education, logging and monitoring, application control, and more.

What to make of the Crowdstrike outage?

On Friday 19 July 2024 a faulty update to security software vendor CrowdStrike's Falcon Sensor application triggered widespread disruption. Companies worldwide were affected, with Microsoft Windows based computers running CrowdStrike software displaying a blue screen of death.

Cybersecurity. It's constantly evolving. Have you updated your firms best practices for 2024?

Cyber security continues to be a prime concern for law firms in 2024. How can you help to ensure that your firm is ready?

Sentrian is an ISO27001 certified organisation

As a Managed Services Provider, Sentrian must maintain high levels of security internally to protect our customers and their data. In addition to the many controls that we have implemented, Sentrian are also ISO 27001 Information Security certified to give our customers the certainty that they require to know that our organisation follows international best practice.

What to Look for in an IT Service Provider for Healthcare Organisations

The healthcare industry in Australia relies heavily on technology to deliver efficient patient care while maintaining the security of sensitive data. Whether you're running a small clinic or a larger healthcare facility, finding the right IT partner is vital...

Enhancing Cybersecurity with Desktop as a Service: A Guide for Business Owners

Azure Virtual Desktop, Microsoft's flagship hosted Windows 10 platform, provides a huge number of benefits including low cost, high performance, flexibility and security.

Access Office Files from Home Seamlessly with Virtual Desktop Services

Learn how Virtual Desktop Services provide a seamless, secure solution to accessing office files from home. With features like centralised data storage, secure remote access, these services are an invaluable tool.

How to Minimise IT Security Risks with a Virtual Desktop Service

Investigating how a businesses iT security environment can be improved by the use of virtual desktop services.

Cyber Insurance – What insurers are looking for before they will provide you cover

Getting and keeping a cyber insurance policy is no longer a simple matter of finding a broker and buying one. As the cyber risk increases year on year, insurers are tightening up requirements that must be met by companies before they can be considered for a policy. We have worked with Hunter Broking Group, cyber insurance experts, to come up with the 6 most common requirements that insurers will have before considering writing a policy for your business.

Are my passwords at risk?

Safety of passwords is still critical in protecting your data, this is reminder of how to ensure your passwords are not at risk.

Latest news on cyber attacks

An update on cyber security attacks, both internationally and in the APAC region, from the latest Verizon Data Breach Investigations Report.

Microsoft ATP - What is it? And why do I need it?

Now, more than ever, we are required to be aware of fraudulent email attacks. Learn how Microsoft ATP can keep you safe no matter where you're working.

The biggest data breach threat today and the silver bullet to stop it.

Details of the current biggest threat to data breach and how applying MFA will stop it.

In (cyber) space, no one can hear you scream.

The top 4 security trends that could come back to bite you if you ignore them.

FileCloud - an easier way to share data

Access your data the way YOU want to, without compromising security or control.

Seven password dos and don'ts

Quick, fast tips for making your passwords more secure. See our password dos and dont's.

How to stop using passwords

Using and remembering passwords doesn't have to be a day-to-day chore. You likely already have the devices needed to reduce your reliance on passwords.

Facial recognition in many phones not as secure as hoped

Facial recognition security in many phones from LG, Sony, Samsung & more is not secure and can easily be fooled by a simple photo. But Face ID by Apple and long passcodes remain viable security methods.

Outlook quietly sending automatic read receipts on mobile devices

Outlook on mobile devices has a default setting to automatically allow read receipts in the background, regardless of your desktop settings.

A short history of computer viruses

Systems Engineer Alex Uhde explores the history of computer viruses to explain where the latest 'WannaCry' & 'NotPetya' attacks came from and how they work.

Subscribe to our Newsletter.