top of page

Elepay Cyber
Resilience Focus

Glen Gooding_hi col.jpg

Meet the industry specialist entrusted with protecting your digital transactions and privacy.

 
Glen Gooding

ELEPAY CYBER SECURITY STRATEGIC ADVISOR

CRFocusFeature.jpg

Introduction

In today’s interconnected world, the significance of robust cybersecurity measures cannot be overstated, especially for Australian businesses like yours. With the increasing frequency and sophistication of cyber threats, it is crucial to prioritise the protection of your sensitive data, customer information, and digital infrastructure.

 

As your trusted partner, we want to emphasise the importance of cybersecurity and provide you with valuable insights to safeguard your business.  

10 Part Cyber Security Series

At Elepay, a key principle we hold is around the secure approach that we place around ‘your’ digital information that you entrust with us. Trust is a two-way street and to earn this, you provide us with data so we can make an informed decision on our future partnership.

 

Equally, we need to commit to treating ‘your’ information with the utmost care and respect.   

The cyber security team at Elepay is authoring a 10-part series focusing on best practices to keep yourself and/or your business fit and healthy from a cyber security standpoint.  By understanding the threat landscape and being familiar with cyber systems and secure ways of conducting business, our Partners and Customers can be in the best possible position to defend themselves.

Cyber Security 10 Part Series

The subject topics will sometimes take on a business aspect, at other times a personal viewpoint, and in some cases, both will be covered.  

 

Feel at ease to comment or even call for a confidential discussion about what security concerns you are facing. 

CSP1Thumbnail.jpg

PART 1

Introduction

CSP2Thumbnail.jpg

PART 2

Remaining

Cyber Vigilant

CSP3Thumbnail.jpg

PART 3

Understanding the Threat Landscape 

CSP4Thumbnail.jpg

PART 4

Strong Passwords and Multi Factor Authentication

CSP5Thumbnail.jpg

PART 5

Avoid Using

‘Free Wifi’ 

CSP6Thumbnail.jpg

PART 6

VPN – Should I Install? 

CSP7Thumbnail.jpg

PART 7

Importance of Employee Training 

CSP8Thumbnail.jpg

PART 8

Implementing Robust Password Policies 

CSP9Thumbnail.jpg

PART 9

Regular Software Updates and Patch Management

CSP10Thumbnail.jpg

PART 10

Backing Up Essential Data 

bottom of page