Insights & Resources

Cyber Security & IT Insights

Practical advice, industry updates, and cyber security guidance for Australian businesses — from the Jam Cyber team.

Recent Posts

07/04/2026

Cyber Insights

April 2026 Cyber Brief

This month's stories share a common thread: the consequences of adopting and deploying technology without governing it are becoming specific, documented, and in some cases legally enforced.

March 2026 Cyber Brief

05/03/2026

Cyber Insights

March 2026 Cyber Brief

Jam Cyber Brief March 2026 Edition March is a good moment to take stock of two things that have quietly shifted over the past few months: the compliance…

February 2026 Cyber Brief

04/02/2026

Cyber Insights

February 2026 Cyber Brief

Jam Cyber Brief February 2026 Edition This month, we’re seeing businesses feeling the weight of the “AI balancing act”. AI tools are becoming more powerful and…

What Is Cyber Security in 2026

04/02/2026

Blog

What Is Cyber Security in 2026

What Is Cyber Security in 2026 We hear it in the news constantly, but cyber security is still often misunderstood. Many businesses still associate it with…

Does My Business Need Cyber Security?

30/01/2026

Blog

Does My Business Need Cyber Security?

Does My Business Need Cyber Security? Are you still wondering whether cyber security is necessary for your business? In practice, the question has shifted.…

How to Improve Your LastPass Security Score

29/01/2026

Cyber Insights

How to Improve Your LastPass Security Score

How to Improve Your LastPass Security Score Cloud passwords sit at the centre of how most businesses operate. Email access, accounting systems, customer data,…

Past Posts

January 2026 Cyber Brief

06/01/2026 • Cyber Insights

January 2026 Cyber Brief

Jam Cyber Brief January 2026 Edition Welcome to our first edition of 2026, where we are beginning the year on a high! We are very proud to share that Jam Cyber…

Backups: The Safety Net Every Business Needs

08/12/2025 • Cyber Security Resources

Backups: The Safety Net Every Business Needs

Regular Backups: The Safety Net Every Business Needs Cyber attacks, system failures and human errors are, unfortunately, becoming all too common for Australian…

December Cyber Brief

04/12/2025 • Cyber Insights

December Cyber Brief

Jam Cyber Brief December 2025 Edition 2025 has seen dramatic changes in the technical adoption and development for businesses globally. Additionally, the wave…

November Cyber Brief

03/11/2025 • Cyber Insights

November Cyber Brief

Jam Cyber Brief November 2025 Edition This month’s cyber brief focuses on human risk and shared responsibility. Cyber security technology is now a given, which…

October Cyber Brief

07/10/2025 • Cyber Insights

October Cyber Brief

Jam Cyber Brief October 2025 Edition October marks Cyber Security Awareness Month, a reminder that protecting your business doesn’t have to be complicated.…

September Cyber Brief

08/09/2025 • Cyber Insights

September Cyber Brief

Jam Cyber Brief September 2025 Edition From the rise of quantum computing and AI-native graduates entering the workforce, through to the risks of shadow IT and…

August Cyber Brief

07/08/2025 • Cyber Insights

August Cyber Brief

Jam Cyber Brief August 2025 Edition This month’s brief covers several key developments that will affect how firms operate and respond to cyber threats. We look…

July Cyber Brief

07/07/2025 • Cyber Insights

July Cyber Brief

Jam Cyber Brief July 2025 Edition This month’s edition of the Jam Cyber Brief brings you a clear look at the trends, tools, and threats shaping Australia’s…

June Cyber Brief

12/06/2025 • Cyber Insights

June Cyber Brief

Jam Cyber Brief June 2025 Edition Cyber and technology insights for Australian firms and small to medium businesses The Jam Cyber Brief delivers focused,…

Should my business use AI?

30/09/2024 • Cyber Security Resources

Should my business use AI?

Should my business use AI? Business owners across all industries are asking the question: should we use AI? For most, the answer will not be “yes or no” but…

What is VoIP and how can it help cyber security?

30/08/2024 • Cyber Security Resources

What is VoIP and how can it help cyber security?

What is VoIP and how can it help cyber security? As businesses grow and adapt to new challenges, the demand for reliable, cost-effective, and scalable…

What Does a Managed Service Provider Do?

22/07/2024 • Cyber Security Resources

What Does a Managed Service Provider Do?

What Does a Managed Service Provider Do? Staying ahead of technological advancements and maintaining strong cyber security measures can add extra time and…

Building a Positive Cyber Security Culture

19/07/2024 • Cyber Insights

Building a Positive Cyber Security Culture

Building a Positive Cyber Security Culture A successful cyber security culture starts at the top. We often hear the term “a great company culture”. This is…

Remote Monitoring & Management (RMM) Agent

07/06/2024 • Tips & Resources

Remote Monitoring & Management (RMM) Agent

Remote Monitoring & Management (RMM) Agent In this article What is RMM? RMM Agent Installation Process 1: Download the file: AgentSetup_CLIENT_NAME.exe 2:…

Installing Programs or Apps

07/06/2024 • Tips & Resources

Installing Programs or Apps

Installing Programs or Apps In this article Before you start What are MAP and PolicyPaK Installing a new program or app Step 1: standard install process Step…

LastPass: Set SMS Account Recovery

05/06/2024 • Tips & Resources

LastPass: Set SMS Account Recovery

LastPass: Set SMS Account Recovery 1. While logged in to your LastPass account, click Account Settings. Under General tab, scroll down and click ‘Update Phone’…

LastPass: Enable Multi-factor Authentication

05/06/2024 • Tips & Resources

LastPass: Enable Multi-factor Authentication

LastPass: Enable Multi-factor Authentication 1. While logged in to your LastPass account, click Account Settings and click on ‘Multifactor Options’. Look for…

Cyber CEO – What is Log4J hack?

03/06/2024 • Cyber CEO

Cyber CEO – What is Log4J hack?

https://youtu.be/0T3oG2I4av4 Cyber CEO - What is Log4J hack? In this video, we dive into the Log4j hack, a significant vulnerability that emerged in December…

Cyber CEO - Managed Services Provider (MSP)

06/05/2024 • Cyber CEO

Cyber CEO - Managed Services Provider (MSP)

https://www.youtube.com/watch?v=3-Br0X7-uls Cyber CEO – Managed Services Provider Welcome to Cyber CEO! This video provides an overview of Managed IT Services…

Spot Phishing And Scam Emails

25/03/2024 • Cyber Security Resources

Spot Phishing And Scam Emails

//Cybersecurity for business 16 Ways to Spot a Phishing Email: Your Guide to Safer Inboxes With our businesses becoming more digital, the need for heightened…

Cyber CEO - Man-in-the-Middle Attacks

04/03/2024 • Cyber CEO

Cyber CEO - Man-in-the-Middle Attacks

https://youtu.be/azRfbm7_dw8 Cyber CEO – Man-in-the-Middle Attacks Welcome to another Cyber CEO video. Here, we focus on man-in-the-middle attacks, which pose…

What is a notifiable data breach?

26/02/2024 • Cyber Security Resources

What is a notifiable data breach?

What is a notifiable data breach? In today's digitally connected world, cyber security is more critical than ever. One vital aspect of cyber security that has…

Cyber CEO - Administrative Privileges

05/02/2024 • Cyber CEO

Cyber CEO - Administrative Privileges

https://youtu.be/AqZ55mH6Pro Cyber CEO – Administrative Privileges Welcome to our Cyber CEO series, where we break down complex IT and cyber security concepts…

The new frontier of email fraud

22/01/2024 • Cyber Security Resources

The new frontier of email fraud

The new frontier of email fraud If you received an urgent, realistic request from your manager via email, that sounded like them and used internal/industry…

Cyber CEO – ACSC Essential 8

15/01/2024 • Cyber CEO

Cyber CEO – ACSC Essential 8

https://www.youtube.com/watch?v=hJSLemvR-pg Cyber CEO – ACSC Essential 8 Welcome to another Cyber CEO video series, where we break down key cyber security…

What is an Incident Response Plan?

18/12/2023 • Cyber Security Resources

What is an Incident Response Plan?

What is an Incident Response Plan? The primary purpose of an Incident Response Plan is to provide all employees, including the Management Team, with a clear…

Cyber CEO – Ransomware

04/12/2023 • Cyber CEO

Cyber CEO – Ransomware

https://youtu.be/yT8gwnXHkEQ Cyber CEO – Ransomware Cyber security has become a major concern for businesses of all sizes. To help business leaders and owners…

Cyber CEO – Application Whitelisting

06/11/2023 • Cyber CEO

Cyber CEO – Application Whitelisting

https://youtu.be/hvwIZJuL5xY Cyber CEO – Application Whitelisting Welcome to another video of the Cyber CEO series, where we break down complex cyber security…

Cyber CEO – Multifactor Authentication

02/10/2023 • Cyber CEO

Cyber CEO – Multifactor Authentication

https://youtu.be/U1yOzb-ZIhE Cyber CEO – Multifactor Authentication Welcome to Cyber CEO! In this blog, we’re diving into multifactor authentication (MFA),…

The Danger of Using Public Wi-Fi Networks

29/09/2023 • Cyber Insights

The Danger of Using Public Wi-Fi Networks

Navigating the Risks: The Dangers of Using Public Wi-Fi Networks In our interconnected world, staying connected is a necessity for businesses and individuals…

Cyber CEO - Cyber Security For Business

04/09/2023 • Cyber CEO

Cyber CEO - Cyber Security For Business

https://youtu.be/gVmTQRbqtdA Cyber CEO – Cyber Security For Business Welcome to Cyber CEO, where we explain cyber security terms and concepts for businesses.…

Cyber CEO – Application Hardening

07/08/2023 • Cyber CEO

Cyber CEO – Application Hardening

Cyber CEO – Application Hardening Short videos explaining things around cyber threats and cyber security for small and medium business. This session asks “…

Know your legal obligations

12/06/2023 • Cyber Insights

Know your legal obligations

Do you know your legal and ethical obligations if your business experiences a cyber attack? A cyber attack can be devastating for a business. In fact, 22% of…

Australian Cyber Security Centre Warning

10/04/2023 • Cyber Insights

Australian Cyber Security Centre Warning

Australian Cyber Security Centre warning Australia may end up in cyber warfare “crossfire” according to a warning from the Australian Cyber Security Centre…

What’s Your CYBER RISK?

13/02/2023 • Cyber Insights

What’s Your CYBER RISK?

What’s Your CYBER RISK? Do you know what your cyber risk is? Unfortunately, some industries and business structures are at more risk of a cyber attack than…

Shields Up Warning

16/01/2023 • Cyber Insights

Shields Up Warning

Shields Up Warning by the U.S. Government’s Cyber Security & Infrastructure Agency (CSIA) Yesterday, the U.S. Government’s Cyber Security & Infrastructure…

Log4J, The Cyber Security Threat of the Decade?

19/12/2022 • Cyber Insights

Log4J, The Cyber Security Threat of the Decade?

Log4J, The Cyber Security Threat of the Decade? LOG4J, the cyber security threat of the decade? As you may have seen in the media, there has been a major cyber…

The Ultimate Enterprise Ransomware Guide

14/11/2022 • Cyber Insights

The Ultimate Enterprise Ransomware Guide

The Ultimate Enterprise Ransomware Guide A recently released in-depth ransomware guide by Sonicwall is the cure for insomnia for most, but really well written…

Ransomware Rampage Exploited Kaseya Update System

13/06/2022 • Cyber Insights

Ransomware Rampage Exploited Kaseya Update System

1m computers affected, $US70m ransomware demand – Ransomware as a Service made scalable by means of a supply chain attack! Similar to the Solarwinds hack last…

Cyber security and the other 99.8 percent

09/05/2022 • Cyber Insights

Cyber security and the other 99.8 percent

Cybersecurity and the other 99.8% It is not hard to see why the majority of small to medium enterprise (SME) owners in Australia feel that a cyber-attack would…

How many is too many passwords?

14/03/2022 • Cyber Insights

How many is too many passwords?

How many is too many passwords? That is 191 passwords for 191 accounts. So, we can all be forgiven for using the same username and password for multiple…

Advisory 2020-008

14/02/2022 • Cyber Insights

Advisory 2020-008

Advisory 2020-008 The Australian Government’s Cyber Security Centre (ACSC) has titled the attacks ‘Copy-paste compromises’ and has announced on its website…

Want cyber security insights delivered to your inbox?

Subscribe to the Jam Cyber newsletter for monthly cyber briefs and practical tips for Australian businesses.

Newsletter signup form will appear here.