Resources
Take proactive steps to protect your business from cyber threats and stay informed with our free downloadable cybersecurity resources from the highly experienced Morrisec team.
Privacy and Other Legislation Amendment Bill 2024: Key Changes Explained
Explore the critical updates to Australia’s privacy laws with our latest downloadable PDF. The Privacy and Other Legislation Amendment Bill 2024 introduces enhanced privacy protections, including new rights for individuals, stricter penalties, and a focus on transparency in data use. Learn how these changes impact organisations and strengthen privacy in the digital age.
For more information, see the full article.
Toustone ISO/IEC 27001 Certification Case Study
This case study details our unique approach supporting a leading advanced analytics and data intelligence company achieve ISO/IEC 27001:2022 certification, leveraging a practical, risk-based approach. Learn how focused assessments and tailored security controls created a sustainable security framework aligned with their unique business needs.
For more information, see the full online article.
Fun with Vulnerabilities
This hands-on course by Morrisec takes a unique approach to security training, designed specifically for developers. Through interactive learning, participants will discover and exploit vulnerabilities, learn how to write secure code, and integrate security practices into their development lifecycle. Empower your team to become your organisation’s strongest defence against real-world threats.
For more information, see the full article.
Morrisec is Committed to Being Green
At Morrisec, we are proud to announce our commitment to sustainability and environmental responsibility. While we may be a small company, we think big in terms of what we can do to support and promote sustainability within our industry and beyond.
Tax Time Scams 2024
It’s that time of year again when scams around EOFY come rolling in. We have compiled a downloadable resource to provide you with information on the latest ATO-related tax time scams and how to avoid them.
For more information, see the full article.
Be a Cyber-Secure Volunteer
To assist not-for-profit organisations in mitigating the cybersecurity risks associated with volunteer engagement, we’ve created this complimentary poster. Feel free to distribute this to your volunteer teams in print or digital form. If you would like us to customise it with your logo, just reach out.
For more information, see the full article.
Updates to ISO/IEC 27001:2022
We have pulled together all the changes from the 2022 version of ISO/IEC 27001 in an easy-to-read, downloadable form so you can easily reference the changes across the clauses and Annex A controls.
For more information, see the full article.
10 Password Security Tips
For World Password Day, to help you, your family, friends and colleagues stay safe, we have put together this downloadable Password Security tip sheet with 10 tips to help you secure your digital identity and stay safe out there.
Australian Privacy Laws
An easy-to-understand overview of the 13 Australian Privacy Principles, what they are, what purpose they serve, and what you need to do to be compliant.
For more information, see the full article.
How to Avoid Online Scams
Online scams are a major threat, and these scams escalate around the holiday seasons. In this summary, we discuss the 6 most common holiday scams and 10 ways to avoid falling victim.
For more information, see the full article.
What is an Insider Threat?
Insider threats are on the rise, and you need to know what they are to defend against them. In this summary, we discuss the different types of insider threats and 7 steps you can take to defend against them.
For more information, see the full article.
Why Do I Need an Asset Register?
An asset register is a crucial part of any cybersecurity strategy. In this summary, we provide an overview of what to include in your asset register to get the most benefit.
For more information, see the full article.
Preparing for Data Breach Notifications
Most legislative and regulatory compliance requirements now include some form of mandatory breach notification. In this summary, we outline breach notification requirements for the most common compliance requirements for Australian companies.
For more information, see the full article.
Recruiters, HR and Personal Information
A lot of personal information is collected by recruiters and HR departments. In this summary, we outline what personal data still falls under the Privacy Act and the steps you can take to protect this information.
For more information, see the full article.
What Happens to Your Data After a Breach?
Ever wondered why threat actors are targeting personal information? In this summary, we outline the most common methods used to acquire this information and what they do with it after they have it.
For more information, see the full article.
Board Member Responsibilities
As an executive or board member, you need to be asking the right questions to ensure your cybersecurity strategy is on track. In this summary, we provide you with the questions you need to ask to get the real story.
For more information, see the full article.
Australia's Privacy Legislation Amendment
Australia’s Privacy Legislation Amendment is now in place. In this summary, we discuss the changes and how they impact your business and compliance obligations.
For more information, see the full article.
Social Media Privacy
Social media is a major part of our lives but poses a number of risks to our privacy. In this summary, we outline what the risks are and what you, your family and your friends can do to stay safe online while using social media.
For more information, see the full article.