The ACSC’s Step-by-Step Guides (found here) demonstrate how more than 12 effective security controls, including automatic updates, backing up & restoring files, and multifactor authentication, on various platforms can be turned on in minutes. Let the ACSC walk...
Cloud security is often overlooked by organisations invested in public cloud infrastructure such as Microsoft 365 and business apps. It’s a shared responsibility for providers and consumers to protect and secure resources in the cloud – a common misconception is that...
This critical vulnerability referenced under Microsoft Security Advisory ADV200004 affects Microsoft Office 2016, Microsoft Office 2019, Microsoft Office ProPlus 365 and Paint3D. Microsoft have announced a remote code execution vulnerability that would allow...
Introducing ConfigMgr – Microsoft Endpoint Configuration Manager Traditional System Center Configuration Manager “SCCM” is now being referred to as Microsoft Endpoint Configuration Manager by our friends at MS, due its recent rebranding and amalgamation...
Microsoft announce critical CyptoAPI Spoofing, Remote Desktop Gateway and Remote Desktop Client vulnerabilities which have been followed by an emergency directive from the US Department of Homeland Security. An emergency directive has been released by the United...
S5 Technology Group has enforced strict security policies as part of our technical standards long before the introduction of the Australian Notifiable Data Breach Legislation and Europe’s General Data Protection Regulations. Our customers are well positioned as...