Making Sense Of Security

Extensive media coverage relating to cyber terrorism, hacking attacks and cyber attacks have become commonplace. All such attacks against organisations and people target confidentiality, integrity or availability of information. In general these attacks reflect the fact that the world is becoming increasingly inter-connected with a high demand for data accessibility and availability across many channels. The internet renders such attacks being precipitated from anywhere in the world. Cyber attacks are launched, and many are successful, because organisations and people are incredibly vulnerable to attack due to flaws in the components that make up any system – people, process and technology.

While there certainly is an element of well-funded groups, cyber criminals and organised crime, cyber attacks are not limited to elite and powerful groups. Whilst the sophistication of attacks is increasing to defeat new technologies, significant damage can be caused by untrained people with access to the tools and time to use them.

With hackers enhancing their skills and finding more sophisticated methods of attack, organisations still are not prioritising cyber security. While most are under the assumption of ‘it won’t happen to me’ and then become reactive once an attack has occurred, others just don’t understand the threats that hackers present or the importance of cyber security to an organisation.

Through a series of Making Sense of Security articles, SOS will be aiming to shine the light on cyber security topics that are arising and ever increasing in the world today.

SOS will strive to contribute to the body of security knowledge, share their expertise and help organisations reduce security risk.

If a business wishes to survive, let alone prosper, it must grasp the importance of cyber security and put into place appropriate measures and processes.



At the annual AISA conference, our COO Murray Goldschmidt delivered a compelling analysis on cyber security containers. Download our Making Sense Of Testing Container Security document for a succinct overview of the subject.



What organisations fail to realise is that most security issues with O365 do not relate to the service provider – they relate to deployment choices around access. Download our Making Sense of the security threat to Office 365 document to gain an insight the what issues surround the platform, what are some warning signs as well as some countermeasures.

Making Sense of the Security Threat to Office 365


No one is safe when it comes to malware. Malware can gain access to your network from a huge range of unlimited attack vectors and can infiltrate in the most devious ways. To learn more about what malware is, common attack methods, protection and undertaking a Malware Breakout Penetration Test download and have a read of our Making Sense of Malware Breakout Penetration Testing document.

Making Sense of Malware Breakout Penetration Testing


NSW Cyber Security Policy came into effect from February 2019. The new Cyber Security Policy replaces the NSW Digital Information Security Policy 2015 and is an outcome of the NSW’s cyber security strategy. As part of the reporting obligations, a report on cyber security maturity needs to be submitted to agency head and GCISO by August 31st each year. For more information have a read of our Making Sense of NSW Government Cyber Security Policy document.

Making Sense of NSW Government Policy