by Paul Friend | Nov 22, 2025 | Blog
Summary Credentials – the combination of usernames and passwords – remain among the simplest yet most exploited attack vectors in Australian organisations. According to the Office of the Australian Information Commissioner (OAIC) the majority of reported cyber...
by Paul Friend | Aug 28, 2025 | Blog
Password managers are often seen as one of the most effective defences against account takeover. They generate strong, unique passwords, store them securely, and autofill only on legitimate sites. For enterprises, they centralise identity hygiene, enforce policies,...