Threat intelligence: Transform your data from hidden liability to strategic asset

Customer data has long been seen as the new oil for businesses to monetise. However, circling cyber criminals, privacy backlash and tightening compliance rules can turn valuable data oil into dangerous asbestos if it is mishandled. That’s where threat intelligence is essential.
Efficiency and beyond: Is your university sitting on an AI data goldmine?

The education sector is under pressure to evolve from all sides. While modernising efficiency and student experience using AI tools is a burning priority, there’s an even bigger potential opportunity that leverages unique assets that faculties have built up over decades.
AUSCERT2024 wrap: Let’s talk phishing-as-a-service and tightening data privacy rules

The Nexon team gathered with hundreds of delegates and vendors on the Gold Coast for four days of workshops, presentations, and meetups. There was a lot to learn from groundbreaking security innovations and chats with industry experts.
Enhancing workplace flexibility: Enabling hot desking for Poly desk phones in Zoom

In the era of hybrid work models, flexibility is key to maintaining productivity and employee satisfaction. Hot desking, a workspace sharing model where multiple employees use a single physical workstation during different time periods, has become a popular solution for maximising office space and accommodating flexible work schedules. Zoom, combined with Poly phones, offers a […]
Simplifying the Process: Provisioning Poly desk phones in Zoom

In today’s fast-paced work environment, seamless communication is crucial for maintaining productivity and collaboration. Zoom, a leader in video conferencing and communication solutions, has made strides in integrating hardware with its platform to offer a more unified communication experience.
The Importance of Employee Cyber Security Training

Discover the importance of employee cyber security training in safeguarding your organisation. Learn how it can prevent data breaches, comply with laws, and foster a secure corporate culture. Equip your workforce to be the first line of defence against cyber threats.
Did you lock the back door? Why operational technology (OT) is a rising target for cybercrime

The heat has been on securing corporate IT systems from hackers, but the rise of connected devices in industrial operations exposes new vulnerabilities and risks that can be more damaging than data breaches.
The Strategic Advantage of Integrating Genesys Cloud with ServiceNow

Discover how integrating Genesys Cloud with ServiceNow can transform your organisation, streamline operations, and elevate customer experiences. Embrace digital innovation to stay agile and competitive.
Hurry up AND wait: The case for a three-speed AI strategy for SMEs

Despite the unrelenting release of ‘game-changing’ AI tools, the game remains remarkably unchanged for many traditional SMEs. Yes, AI will transform how we all work, eventually. In the meantime, organisations need a plan to move fast, but not break things.
Unlocking Cloud Agility: Transitioning from MPLS to SD-WAN with Nexon

With the ever-increasing pace of adoption and reliance on cloud-based applications and AI services – the reliability, availability, security and performance of networks capable of supporting emerging technologies and evolving business requirements is critical.