Stay Ahead of the Game

Resources

Stay ahead of cyber threats with free, practical resources created by the experienced Morrisec team.

Privacy and Other Legislation Amendment Bill 2024: Key Changes Explained

Explore the critical updates to Australia’s privacy laws with our latest downloadable PDF. The Privacy and Other Legislation Amendment Bill 2024 introduces enhanced privacy protections, including new rights for individuals, stricter penalties, and a focus on transparency in data use. Learn how these changes impact organisations and strengthen privacy in the digital age.

For more information, see the full article.

Fun with Vulnerabilities

This hands-on course by Morrisec takes a unique approach to security training, designed specifically for developers. Through interactive learning, participants will discover and exploit vulnerabilities, learn how to write secure code, and integrate security practices into their development lifecycle. Empower your team to become your organisation’s strongest defence against real-world threats.

For more information, see the full article.

Morrisec is Committed to Being Green

At Morrisec, we are proud to announce our commitment to sustainability and environmental responsibility. While we may be a small company, we think big in terms of what we can do to support and promote sustainability within our industry and beyond.

For more information, see the full article.

Tax Time Scams 2024

It’s that time of year again when scams around EOFY come rolling in. We have compiled a downloadable resource to provide you with information on the latest ATO-related tax time scams and how to avoid them.
For more information, see the full article.

Be a Cyber-Secure Volunteer

To assist not-for-profit organisations in mitigating the cybersecurity risks associated with volunteer engagement, we’ve created this complimentary poster. Feel free to distribute this to your volunteer teams in print or digital form. If you would like us to customise it with your logo, just reach out.

For more information, see the full article.

Updates to ISO/IEC 27001:2022

We have pulled together all the changes from the 2022 version of ISO/IEC 27001 in an easy-to-read, downloadable form so you can easily reference the changes across the clauses and Annex A controls.

For more information, see the full article.

10 Password Security Tips

For World Password Day, to help you, your family, friends and colleagues stay safe, we have put together this downloadable Password Security tip sheet with 10 tips to help you secure your digital identity and stay safe out there.

Australian Privacy Laws

An easy-to-understand overview of the 13 Australian Privacy Principles, what they are, what purpose they serve, and what you need to do to be compliant.

For more information, see the full article.

Social Media Privacy

An easy-to-understand overview of the 13 Australian Privacy Principles, what they are, what purpose they serve, and what you need to do to be compliant.

For more information, see the full article.

How to Avoid Online Scams

Online scams are a major threat, and these scams escalate around holiday seasons. In this summary, we discuss the 6 most common holiday scams and 10 ways to avoid falling victim.

For more information, see the full article.

What is an Insider Threat?

Insider threats are on the rise, and you need to know what they are to defend against them. In this summary, we discuss the different types of insider threats and 7 steps you can take to defend against them.

For more information, see the full article.

Why Do I Need an Asset Register?

Insider An asset register is a crucial part of any cybersecurity strategy. In this summary, we provide an overview of what to include in your asset register to get the most benefit.

For more information, see the full article.

Preparing for Data Breach Notifications

Most legislative and regulatory compliance requirements now include some form of mandatory breach notification. In this summary, we outline breach notification requirements for the most common compliance requirements for Australian companies.

For more information, see the full article.

Recruiters, HR and Personal Information

A lot of personal information is collected by recruiters and HR departments. In this summary, we outline what personal data still falls under the Privacy Act and the steps you can take to protect this information.

For more information, see the full article.

What Happens to Your Data After a Breach?

Ever wondered why threat actors are targeting personal information? In this summary, we outline the most common methods used to acquire this information and what they do with it after they have it.

For more information, see the full article.

Board Member Responsibilities

As an executive or board member, you need to be asking the right questions to ensure your cybersecurity strategy is on track. In this summary, we provide you with the questions you need to ask to get the real story.

Australia’s Privacy Legislation Amendment

Australia’s Privacy Legislation Amendment is now in place. in this summary, we discuss the changes and how they impact your business and compliance obligations.

For more information, see the full article.