Posts by Brandon Salem
What the “Essential” in Essential Eight Really Means
As per the ACSC’s earlier descriptions, the Essential Eight was developed as a prioritised set of mitigation strategies for traditional Windows‑based, internet‑connected networks. It focused on the most common intrusion methods of that era, including malware execution, credential theft and exploited software vulnerabilities. This historical context matters. While these threats remain relevant, the technology landscape…
Read MoreInsider Risk Starts With Every Employee
When a leading security firm is impacted, it naturally raises a confronting question: If it can happen there, what does that mean for everyone else? It is easy to view this as a story about advanced threat actors targeting specialised security vendors. But the broader lesson is far more relevant: Insider risk isn’t limited to…
Read MoreThe Trifold Era: The Next Major Shift in Enterprise Mobile Working
Each generational shift in hardware has mirrored broader transformations in workplace expectations, mobility patterns, and productivity requirements. For decades, IT leaders have sought to balance two competing imperatives: maximising productivity while supporting an increasingly mobile workforce. Today, with the rapid maturation of foldable display technologies and the accelerating transition toward cloud-centric operating models, we may…
Read MoreWindows 10 End-of-Life: More than an IT Deadline
⚠️ The Compounding Risks of Inaction Running Windows 10 beyond its end-of-life introduces risks that intensify the longer systems remain in use: 🔴 Operational Risk – Outdated systems face compatibility issues with modern applications, cloud platforms, and vendor support. As these gaps widen, productivity falls, downtime rises, and IT resources are further burdened. 🔴 Security…
Read MoreIT Cost Optimisation: Part 2 – The Art and Science of Right-Sizing
What Is Right-Sizing? Right-sizing is more than just cutting back; it’s the strategic process of precisely matching your IT resources (incl. assets) with actual requirements. Think of it as finding the “Goldilocks zone” for your digital estate: not too much, not too little, but just right to meet your requirements without unnecessary expense. This approach…
Read MoreIngram Micro Outage: A Critical Reminder of Third-Party Risk
Lateral Movement and Privileged Access Risk Distributors like Ingram Micro often configure access to an organisation’s cloud services during the licensing process – potentially without explicit visibility or awareness from the organisation (e.g. via an IT Service Provider or an internal IT admin). A common example involves Microsoft 365 licensing, which can be accompanied with…
Read MoreUnmasking the Invisible: Why True Security Starts with Visibility
The Unseen Passage: A Museum Security Parable Imagine a prestigious museum filled with priceless artefacts. Its security appears impeccable: visitors pass through turnstiles, undergo bag checks, use access cards, and are monitored by trained guards, CCTV, and motion sensors. From the security team’s perspective, all entry points are fortified, ensuring multiple layers of defence. However,…
Read MoreIT Cost Optimisation: Part 1 – Redundant Software
What is Redundant Software? Redundant software, as the name suggests, refers to the use of multiple applications, systems or services—which we will collectively refer to as ‘software’—that serve the same purpose or provide overlapping functionality. While this has always been an issue for organisations, it has become more widespread in recent years due to the…
Read MoreSecurity Is Not a Checklist – A Deeper Dive
In this article, we explore the concept by examining both physical and digital scenarios, illustrating how flexibility, adaptability, and contextual awareness are essential to effective security. A Physical Scenario Imagine a security team assigned to safeguard an asset, at the request of a regular client. The team leader immediately consults a standardised checklist. The team…
Read MoreCIPP Vulnerability Finding – A Third-Party Risk Story
Prior to proceeding with this article, it is important to highlight that the vulnerability is still not fixed at this time but the finding has been disclosed to the vendor and this article is now being published following the mutually agreed upon publish date. This is in understanding that the severity of this vulnerability was…
Read More