CyberSnooping
October 31, 2014
Preface: This article was published in Security Oz Magazine, April 2002, aimed at a non IT-expert audience. Although most of the concepts are highly relevant today, some of the information herein is dated (or no longer applicable), however is archived…
Keeping the Evil In
October 29, 2014
Unfortunately, like so many other areas, the role of IT administrator in an education environment is often underfunded and underappreciated. During time that could be spent preventing hacking and viruses, admins must also deal with everything from stolen mouseballs and…
Who's Watching You?
October 29, 2014
Preface: This article was the cover story in Security Oz Magazine in July 2002, aimed at a non IT-expert audience. Obviously much of the information herein is dated, for example there wouldn't be too many people reading this, who are…
Ethical Hacks - Pay to break into an organisation
October 29, 2014
Good security practice seeks assurance that systems and protective measures are effective through programmes of ongoing review, audit and maintenance. A component of this involves performing self-assessment on the security in your organisation. This is as relevant to traditional physical…
Alarm Myths - Are you getting what you paid for?
October 29, 2014
Many people might only have an alarm installed in their house or office once or twice in a decade. As such, consumers seldom fully-understand what they should be looking for, or how to recognise a good product. This page will…
SLED Advisory Council Submission 5 June 2014
May 27, 2014
The below is a copy of a paper submitted by Daniel Lewkovitz to the SLED Advisory Council in 2014. It is archived here for posterity. It is important to note that this paper was intended for a security industry working…
Questions? Talk to us!
We'll answer your enquiry pronto.