Skip to content
Contact Us on 1300 BC PLAN[email protected]Level 20, Tower 2 Darling Park, 201 Sussex Street, Sydney NSW 2000 Australia
Facebook page opens in new windowTwitter page opens in new windowLinkedin page opens in new windowYouTube page opens in new windowRss page opens in new window
OpsCentre
Risk, Pandemic, Business Continuity, Disaster Recovery & IT Security Solutions
OpsCentreOpsCentre
  • Home
  • Services
    • Resilience & Continuity
      • Business Continuity Management
      • IT Disaster Recovery
      • Crisis Management
      • Emergency Management Planning
      • Workplace Health and Safety
      • Pandemic Response Planning
      • Risk Management
      • Strategy Development
      • Policy, Plan & Process Development
      • Testing & Exercising Services
      • Governance & Compliance
      • Outsourcing & Managed Services
      • Training Services
        • Training Courses
    • Information & Cyber Security Management Services
      • IT Security Management
      • Digital Information Security Policy
      • Security Review & Assessment
      • Security Risk Management
      • Vulnerability & Penetration Testing
    • IT Services & Solutions
      • Solution Design & Implementation
      • IT Service Management
      • IT Process & Policy Development
      • IT Sourcing Strategy
      • GovDC Migration Strategy
      • Technology Refresh Development
      • ITIL Auditing
      • Cloud Risk Assessment
      • Technical User Training
    • Data Management Services
      • Data Management Training & Awareness
      • Data Management Services
      • Data Management Strategy
      • Data Management Platforms & Tools
    • Software Solutions
      • Cyber Security Awareness Training
      • RPx Recovery Planner (BCM Software)
      • MiRA Mobile Incident Response Application
  • About
    • Meet The Team
    • Partners
    • FAQ
  • Clients
    • Testimonials
  • Resources
  • Blog
  • Contact
Search:
  • Home
  • Services
    • Resilience & Continuity
      • Business Continuity Management
      • IT Disaster Recovery
      • Crisis Management
      • Emergency Management Planning
      • Workplace Health and Safety
      • Pandemic Response Planning
      • Risk Management
      • Strategy Development
      • Policy, Plan & Process Development
      • Testing & Exercising Services
      • Governance & Compliance
      • Outsourcing & Managed Services
      • Training Services
        • Training Courses
    • Information & Cyber Security Management Services
      • IT Security Management
      • Digital Information Security Policy
      • Security Review & Assessment
      • Security Risk Management
      • Vulnerability & Penetration Testing
    • IT Services & Solutions
      • Solution Design & Implementation
      • IT Service Management
      • IT Process & Policy Development
      • IT Sourcing Strategy
      • GovDC Migration Strategy
      • Technology Refresh Development
      • ITIL Auditing
      • Cloud Risk Assessment
      • Technical User Training
    • Data Management Services
      • Data Management Training & Awareness
      • Data Management Services
      • Data Management Strategy
      • Data Management Platforms & Tools
    • Software Solutions
      • Cyber Security Awareness Training
      • RPx Recovery Planner (BCM Software)
      • MiRA Mobile Incident Response Application
  • About
    • Meet The Team
    • Partners
    • FAQ
  • Clients
    • Testimonials
  • Resources
  • Blog
  • Contact

Tag Archives: Firewalls

Where are the Holes? Turning IT Security Inside-Out

Disaster RecoveryBy OpsCentre2 October 2014

It’s an unfortunate truth. The holes in your IT security are most likely to be where you neither see them nor expect them. That means they’ll be outside the basic security arrangements that most organisations make. Firewalls, up to date software versions and strong user passwords are all necessary, but not sufficient. Really testing security…

Is Seven the Magic Number for IT Security?

Business ContinuityBy OpsCentre8 May 2014

The number seven crops up in many contexts: the Seven Wonders of the World, the seven dwarfs, and now the seven levels of cyber security. Let’s start with the different levels of threats posed by hackers. In order of increasing severity, we have: script kiddies (hacking for fun); the hacking group (often the first level…

Five Strategies to Prevent a Distributed Denial of Service (DDoS) Attack

Business Continuity, Disaster RecoveryBy OpsCentre18 September 2013

Distributed Denial of Service (DDoS) attacks are becoming a trending and serious issue when it comes to Cyber Security across many industries in particular the banking and financial sectors. In a DDoS attack Botnets (usually referred to as a “Zombie army”) bombards a server or a network with thousands of system requests sent from infected…

OpsCentre
Copyright © 2018 OpsCentre
  • Privacy
  • Disclaimer
  • Copyright
  • Spam Policy
  • Social Media
  • Sitemap
Bottom
Go to Top