BUSINESS TECHNOLOGY SOLUTIONS
GET TO KNOW ADITS
Success Stories
Resources
"*" indicates required fields
Step 1 of 18
Test your knowledge and see if you can answer all questions correctly to escape the cyber criminals!How quick can you be without any clues?
Question 1/9
Learn more about the built-in security features offered by Microsoft 365 in our article.
Muti-factor authentication (MFA) is like having a guard dog at your door! It keeps out unwanted visitors and make sure only you have the key.
Question 2/9
Compliance Manager is a lifesaver for organisations. It simplifies the compliance process by tracking progress and automate task, helping organisations stay on track with regulations.
Question 3/9
See our insights on the MediSecure cyber attack in our article.
Did you expect so many people to be affected? This highlights how important it is to have strong cyber security measures.
Question 4/9
Learn all about the benefits of cloud backup solutions in our article.
By keeping data safely stored off-site, organisations can recover quickly and minimise downtime, making sure they still have access to important information when it matters most.
Question 5/9
Review the OAIC Notifiable Data Breaches Report for all the statistics in Australia.
This is a big jump, almost 50% in just four years. With more people working remotely since COVID-19, it’s important to prioritise WFH policies and protect sensitive information.
Question 6/9
See ADITS' LinkedIn post for the correct answer. Follow us on socials for more insights!
SMBs often think they're not at risk when it comes to cyber security, but they're in fact a prime target for cybercriminals.
Question 7/9
The Essential Eight was first introduced in 2017, but it wasn’t until 2023 that Cyber Security Certification Australia launched the SMB1001, adding a fresh perspective to cyber security frameworks.
Read our article Why the SMB1001 Cyber Security Framework is Making Waves to learn more about the differences between the Essential Eight and the SMB1001.
Question 8/9
The Privacy Act does not apply uniformly to all organisations. Many state and territory government entities are not governed by the Commonwealth Privacy Act but by their own specific laws, like the Information Privacy Act 2009 (QLD). This Act sets out distinct obligations for Queensland government agencies and organisations providing services to government agencies regarding the collection, storage, use, and disclosure of personal information, which can differ from federal requirements, highlighting the importance of understanding the specific laws that apply to your organisation.
Find out more about how your organisation may be impacted by the Privacy Act review by reading this article.
Question 9/9
Learn about the strong response strategy used by critical infrastructure that can be applied to all organisations in this article.
Recovery is like having a spare key to your house. If something bad happens, like a cyberattack or a hardware failure, you can use your recovery plan to get everything back up and running.
DISCOVER THE ADITS DIFFERENCE
Complete the form below and a member of the team will be in touch.