AUSCERT2024 wrap: Let’s talk phishing-as-a-service and tightening data privacy rules

The Nexon team gathered with hundreds of delegates and vendors on the Gold Coast for four days of workshops, presentations, and meetups. There was a lot to learn from groundbreaking security innovations and chats with industry experts.
Enhancing workplace flexibility: Enabling hot desking for Poly desk phones in Zoom

In the era of hybrid work models, flexibility is key to maintaining productivity and employee satisfaction. Hot desking, a workspace sharing model where multiple employees use a single physical workstation during different time periods, has become a popular solution for maximising office space and accommodating flexible work schedules. Zoom, combined with Poly phones, offers a […]
Simplifying the Process: Provisioning Poly desk phones in Zoom

In today’s fast-paced work environment, seamless communication is crucial for maintaining productivity and collaboration. Zoom, a leader in video conferencing and communication solutions, has made strides in integrating hardware with its platform to offer a more unified communication experience.
The Importance of Employee Cyber Security Training

Discover the importance of employee cyber security training in safeguarding your organisation. Learn how it can prevent data breaches, comply with laws, and foster a secure corporate culture. Equip your workforce to be the first line of defence against cyber threats.
Did you lock the back door? Why operational technology (OT) is a rising target for cybercrime

The heat has been on securing corporate IT systems from hackers, but the rise of connected devices in industrial operations exposes new vulnerabilities and risks that can be more damaging than data breaches.
The Strategic Advantage of Integrating Genesys Cloud with ServiceNow

Discover how integrating Genesys Cloud with ServiceNow can transform your organisation, streamline operations, and elevate customer experiences. Embrace digital innovation to stay agile and competitive.
Hurry up AND wait: The case for a three-speed AI strategy for SMEs

Despite the unrelenting release of ‘game-changing’ AI tools, the game remains remarkably unchanged for many traditional SMEs. Yes, AI will transform how we all work, eventually. In the meantime, organisations need a plan to move fast, but not break things.
Unlocking Cloud Agility: Transitioning from MPLS to SD-WAN with Nexon

With the ever-increasing pace of adoption and reliance on cloud-based applications and AI services – the reliability, availability, security and performance of networks capable of supporting emerging technologies and evolving business requirements is critical.
Cyber criminals dominate organised crime: Experts reveal critical security threats and defences

With names like Volt Typhoon, REvil, DarkSide, Anonymous and Killnet, today’s cyber criminals pose and act like cartel kingpins. At our Cyber Insights Briefings, we asked top security advisors to share insights on hacks, ransoms, vulnerabilities and fundamental mistakes organisations make. It was eye-opening.
How to lead your organisation through a cyber security crisis and bounce back

In recent years, cyber incidents have compromised personal data, cost millions, destroyed careers and trashed brand reputations. As a result, business owners, executives and directors are under pressure to act decisively in an environment of fast change and information overload.