-
MDRAddress the growing frequency, type, and severity of cyber threats against SMB endpoints
-
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
-
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
-
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
-
Cloud App SecurityMonitor and manage SaaS security risks for the entire Microsoft 365 environment.
-
SASEZero trust secure access for users, locations, and devices
-
Enterprise-grade SOCProvide 24/7 threat monitoring and response backed by proprietary threat research and intelligence and certified cyber experts
-
Policy ManagementCreate, deploy, and manage client security policies and profiles
-
Incident Response ServiceOn-tap cyber experts to address critical security incidents
-
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Blog Posts by Leon Friend, Security Sales Engineer, APAC
Leon Friend, Security Sales Engineer, APAC
A veteran of the Australian IT Industry with over 28 years’ experience, including 14+ years in Cybersecurity (Network and End Point Protection).
Leon is also a certified instructor, providing technical training to reseller System Engineers in Australia, New Zealand, China, South Korea and Hong Kong as well as end users and project teams.
More recently Leon has focussed on network security with channel enablement through education and supporting activities around solution design, customer engagements, as well as offer definition and marketing initiatives.
Leon holds over 31 licenses and certifications, including a Graduate Certificate in Information Systems Security from Charles Sturt University.
Filter By:
03/22/2023
3 min read
The ACSC Essential Eight in review
We’ve covered all the ACSC Essential Eight mitigation strategies and implementation in detail—but how does it impact your MSP and your customers? Read to learn more.

Cybersecurity
02/23/2023
4 min read
ACSC Essential Eight, Regular Backups
To recover quickly after a cybersecurity incident, it’s essential to have regular backups. Read the blog to learn more about conducting regular backups and how to keep backup data secure.

Cybersecurity
01/18/2023
4 min read
ACSC Essential Eight, Multi-factor Authentication (MFA)
Having a multi-factor authentication (MFA) strategy can help prevent hackers from using compromised credentials to penetrate your environment. Read the blog to learn more about implementing different levels of MFA based on your clients’ cyber risks.

Cybersecurity
12/21/2022
4 min read
ACSC Essential Eight, Patch Operating Systems
An operating system enables the interaction between a computer’s hardware, software, and services—which makes them an attractive target for attackers. Read the blog to learn how patching operating systems can help harden your environment.

Cybersecurity
11/16/2022
4 min read
ACSC Essential Eight, Restrict Administrative Privileges
Stop malicious actors from gaining easy access to your information. Read the blog to learn how restricting administrative privileges can help secure your environment and keep you protected against cyber threats.

Cybersecurity
10/19/2022
4 min read
ACSC Essential Eight, user application hardening
Browsers are an essential tool for accessing and interacting with content online—but this is also what makes them a risk. Read the blog to learn how user application hardening can help secure the browser.

Cybersecurity
09/21/2022
5 min read
ACSC Essential 8, Configure Microsoft Office Macro Settings
Cyberattacks through malicious macros have increased. It is essential to control and configure macro settings to ensure sufficient cybersecurity. Read part 4 of the Essential 8 deep dive series to learn more.

Cybersecurity
08/17/2022
5 min read
ACSC Essential 8, patch applications
Your users may neglect to maintain their applications so if you want to build their cyber resilience, it’s essential that you help them with patch applications. Read the blog to learn more.

Cybersecurity