Code Monkey Cybersecurity
  • Home
  • About Us
  • Phishing Training
  • Fact Check
Sign in Subscribe

Half time prelim

Come on boys

Henry Oliver

Henry Oliver

06 Sep 2025
Half time prelim

When the going gets tough, the tough get going

Come on boys

#flagmantle2025

Read more

Essential Eight - application control

Essential Eight - application control

The first of the Essential Eight from the Australian Signals Directorate (ASD) is application control, which means only allowing approved programs to run on computers and servers to block malware and unwanted software from executing in the first place.cyber+2 What it is Application control is a policy and

By Henry Oliver 02 Sep 2025
Cyber 5th most common reason for small business closures in WA

Cyber 5th most common reason for small business closures in WA

Insurance and business risk analyses for Western Australia in 2025 consistently show that cyber threats—including phishing, ransomware, and data breaches—rank 5th behind financial, insurance, operational, and natural disaster risks as direct causes of small business closure.

By Henry Oliver 25 Aug 2025
The Right Time for Phishing Awareness Training is BEFORE a major incident

The Right Time for Phishing Awareness Training is BEFORE a major incident

Phishing attacks have surged in sophistication in Australia during 2025, with small businesses in Western Australia facing unprecedented risks. According to national cyber security figures, phishing has emerged as the leading cause of cyber incidents[1][2][3][4].

By Henry Oliver 21 Aug 2025
Cyber insurance - what you need to know

Cyber insurance - what you need to know

Why Cyber Insurance doesn't make sense: Brian Snow’s Warning About Insuring Against Intelligent Attackers

By Henry Oliver 19 Aug 2025
Code Monkey Cybersecurity
  • Sign up
  • About Us
  • Phishing Training
  • Fact Check
Powered by Ghost

Code Monkey Cybersecurity

Cybersecurity. With humans.