Skip to content

News and insights from the Enabl team

A man looking curiously at a laptop screen

7 Troubling Trends in Cybersecurity To Keep An Eye On

In the interconnected world of today, cybersecurity threats are constantly evolving and becoming increasingly sophisticated. From automotive hacking to AI threats, from mobile..

Read More

ree individuals working independently at their desks, each using a computer, in an office setting

A Better Way to Procure IT Hardware: Workplace Technology as a Service (WTaaS)

For many years, procurement of workplace technology hasn't changed too much. Most businesses buy IT hardware for cash either directly via their MSP. However, this traditional..

Read More

Two hands typing on a laptop keyboard.

The Risk of Employee Password Theft and How You Can Prevent It

It seems like businesses are practically living in the digital world these days. But you know what? There's a dark side to this—literally. It's called the dark web, and it's like..

Read More

Icon depicting a closed padlock, symbolizing security or privacy.

What Is The Essential 8 and Does Your Business Need to Comply With It?

The Essential Eight represents a cybersecurity structure developed by the Australian Cyber Security Centre (ACSC). Launched in 2017, it's an enhanced version of the Australian..

Read More

Two men looking sternly at the computer screen.

How To Equip Your Employees To Protect Against Phishing Attacks

Ever had an employee succumb to a phishing email? If not, hats off to you! But let's be honest - relying on luck isn't a sustainable strategy. Phishing emails start most cyber..

Read More

A hacker in a hoodie, looking at a laptop, obscured by shadow.

Top 6 Cybersecurity Threats to Watch Out for in 2024

Does it feel like cyber threats are popping up faster than you can keep track? You're not alone. With new threats surfacing daily, it's a constant game of cat and mouse as cyber..

Read More

A woman, face obscured by shadow, smiling.

7 Essential Tips to Help Your Employees Protect Their Online Privacy

As October is Cybersecurity Awareness Month, it's an opportune time to spotlight the importance of online privacy, especially in the workplace. With the digital landscape..

Read More

Lines of code on a laptop screen.

What is a Zero-Day Attack and How Can You Prevent One?

There are many ways a business's security can be breached, and it's the company's job to protect itself from these threats. This is important not only to meet legal requirements..

Read More

Businessman looking contemplatively at his computer screen.

8 Common Types of Phishing Attacks and How to Spot Them

Phishing attacks are among the most common threats that companies face. 83% of businesses have experienced phishing attacks in the past. And 36% of data breaches involve phishing...

Read More

Businesswoman looking at a computer screen.

Why Humans Are the Biggest Risk in Cybersecurity

Cyber threats are on the rise. Every year, we see a rise in the number and complexity of cyber threats. From malware and ransomware to Distributed Denial of Service (DDoS) attacks..

Read More