Thursday, December 8, 2022

How hybrid and flexible work plans are complicating work for managers

Flexible and hybrid working arrangements may be good for employees across the globe, but they are proving nearly impossible for most managers and business owners to cope with. I have been working with managers, executives, business owners and board members all across the country and the globe for many years helping them to hone their leadership style and overcome career and workplace challenges, and I have never seen things so bad.

Fortifying cybersecurity: Smart ways to address the cyber skills shortage 

The Australian Minister for Cyber Security, Hon Clare O’Neil, has been explicit in her public goals for Australia to be the safest cyber nation. In 2023, industry and government will need to focus on innovative ways to address the shortfall in highly skilled cyber professionals. This may involve a genuine national discussion about the focused skilled migration programs for cyber practitioners, greater emphasis on formalised personnel transfers within Five Eyes, QUAD and AUKUS nation states and funding initiatives such as an extension to the current ADF Cyber Gap Program which is set to end in 2023. Additionally, we may see fee relief for cyber related tertiary training, like what we’ve seen with nursing and other disciplines.

How Aussie small business owners can tackle plaguing late invoices

A complaint common from many SMB owners is the never-ending chasing of overdue invoices. With most Aussie SMEs waiting on average 38 days for invoices to be paid, a week longer than they were a year ago, it’s a cash flow challenge that can seem out of your hands. The financial reality is you need to be paid by your debtors – and preferably on time – but we’ve all been left in a situation where the due date passes and there’s still no money in the bank account. Research shows nearly one-third of Aussie business owners spend eight hours a week collecting late payments. So how do you best approach overdue invoice payments?

How can defenders catch security vulnerabilities before attackers do?

Security vulnerabilities are inevitable, and attackers and defenders are in a never-ending race to discover them first. As soon as we find a new attack technique, a bad actor is looking for the next one. Attackers are getting to your firm’s valuable assets faster thanks to new tools, automation, and more opportunities to move through your cloud environment unnoticed.

How to realise higher ROI from your IT projects in four really simple steps

I get grilled by clients every week with all sorts of questions, some technical, some mundane, some challenging. But the fundamental question that underlies almost all of them is: “How can I get a better return on my IT investments?” In the spirit of keeping things simple, here then are the four things I believe every CTO needs to do to generate better ROI.

Open source dependencies: Best practices for developer teams to note

Open source software is everywhere. No matter the industry, every business relies on software to meet their business needs. And most of applications that organizations build and use contain open source elements in their code. As industries migrate to cloud-native applications, and as applications grow in complexity, software security risk grows as well.

How businesses can balance the cost versus value of data management

Data is driving the global economy. With data long-considered the new oil or gold, firms continue to invest heavily in data management and data-led solutions. In fact, by 2030, data collection and analysis will become the basis of all future service offers and business models.  Many organisations may be investing in data management solutions without realising the real cost of data management compared to the value they are getting, according to SNP.

Cyber threat surge: From spilled flat whites to ransomware overnight

IT professionals have never faced a taller challenge. Gone are the days where IT support consisted of only dealing with the co-worker who spilt coffee on their laptop or hasn’t tried turning it on and off again. Instead, IT teams now need to protect dispersed organisations from a range of cyber threats, and for organisations who haven’t invested correctly in cybersecurity, the consequences will be much worse than a coffee-stained keyboard.

Fortifying cybersecurity on Australian shores: 8 tips to keep attacks at bay

With six major data breaches in October 2022 alone, it is becoming clear Aussie firms have become targets for a new ‘cyber’ take on age-old crime. Traditional offences such as theft, blackmail, and ransom attempts are not as trendy as they used to be with the gravitation towards the cyber realm—where all signs show that cybercrime will not be slowing down.

Keeping your guard up in the face of socially engineered phishing scams

Most of us are familiar with phishing emails, with the tell-tale signs of a dodgy emails easy to spot. But, phishing scams are becoming more sophisticated and harder to catch, and aren’t slowing down in volume. Although phishing began on email, it now happens on all digital channels with the ACCC even warning consumers of the spike in ‘Hi Mum’ scams via SMS.