Insider News

There’s been a lot happening at Ericom in recent years, from transitioning through a company merger to carving out new niches in exciting fields for innovation. Here you’ll find everything you need to know about latest developments at Ericom, project highlights, and industry insights from our team.

Letter from the CEO

Letter from the CEO

Error found, and it’s human!

At the end of 2023, we gathered in our company meeting to discuss a matter that continues to weigh heavily on my mind – cybersecurity. Whether following Australian regulations or using online technology to connect with our customers and suppliers, we cannot be a part of the Australian ecosystem without digital tools, and as we navigate the digital landscape, I am compelled to underline the significance of this issue.

I want to stress an uncomfortable truth – our company’s biggest weakness is every single one of us.

Yes, you read it right. It’s not advanced hacking techniques or sophisticated malware programs that pose the most significant threat to our organisation. Not even the relentless hackers tirelessly attempting to infiltrate our systems. It’s us, the people who touch so much of the technology that runs this business.

I know it’s a cliché to say that I’ve seen the fax machine and countless other innovations come and go. But if there’s one thing I’ve learnt, it’s how breathtakingly faster we move onto the next big thing compared to back then. This speed is just the norm as we increase connectivity and reliance on digital tools. But another norm is our constant engagement with technology, whether sending an email or clicking a link. This can be the very action that pulls down the robust system we’ve built.

One such danger is social engineering – hackers use it to manipulate individuals into revealing confidential information. It’s a psychological game where hackers prey on our trust and exploit human vulnerabilities. They use fatigue to get to people, popping up the same message 20 or 30 times until it seems normal and we let our guards down. That’s when they strike, using fraudulent emails or messages that appear legitimate and tricking recipients into divulging sensitive information – also known as phishing attacks.

To help us combat this endeavour, we offer penetration testing and white-hacking services. These tests simulate real-world hacking attempts, enabling us to gauge our preparedness and resilience and improve our defences.

As we march into 2024, let’s remember that cybersecurity is not merely an IT issue – it’s a business survival issue. It’s about safeguarding our livelihood. Take the lessons learnt by family and friends as they continue to be tricked by not just hackers but also the most brilliant impersonation actors.

Please take cybersecurity seriously, stay informed, and remain vigilant. Let’s ensure that we’re not the weak link in our chain. Let’s protect our company, our customers, ourselves, and our families.

Stay safe,

Kyle Page

CEO, Horizon365

Share this:

Kyle Page has shared his thoughts on social engineering in the technology industry.

Letter from the CEO

Kyle Page’s journey to Telstra Hall of Fame

Kyle Page’s journey to Telstra Hall of Fame

Shining a spotlight on the guide of the Ericom team

In the quiet town of Yeppoon, Queensland, an ambitious country kid named Kyle Page began his journey. Fast forward to today, and he stands as the proud recipient of the Telstra Hall of Fame award, a testament to his unwavering dedication and visionary leadership. Kyle’s story starts in the 1980s, cutting his teeth in the technology industry selling typewriters, fax machines, and dial-up internet. Little did he know that these early experiences would shape the foundation of a career marked by innovation.

M2K Acquisition

In a recent milestone, Kyle turned Ericom into a multi-state business by spearheading the acquisition of Victoria’s M2K. This strategic move aimed to address gaps within Telstra and the broader industry. This allowed Kyle to empower his dedicated team, entrusting them with the reigns to manage Ericom while giving him the opportunity to explore new formulas in a fresh territory.

Winning the Offender Technology Tender

Kyle’s leadership played a crucial role in Ericom’s victory in the Offender Technology tender for NSW. Breaking a 20-year dominance by NEC and Optus, Ericom demonstrated their deep knowledge of PABX and UC solutions for the NSW Department of Justice, allowing the team to deliver innovative solutions under the new tender. Today, NSW stands as a world leader in inmate-in-cell technology, delivering better outcomes for communities.

“Invisible Excellence” – A Mantra for Success

Kyle executed the Ericom board’s strategy by prioritising Telstra and recurring contracts, driving revenue, profitability, employee retention, and customer experience. At the core of their success is the mantra of “Invisible Excellence,” a guiding principle shaping behaviour at all levels of the company. As Kyle aptly puts it, “Happy staff deliver happy customers who look to buy more from a trusted partner.”

A CEO Proud of His People

Today, Kyle takes pride not just in the projects Ericom undertakes but in the independent initiatives of his dedicated team. Family values have been the bedrock of Ericom from the start and that remains intact, fostering a sense of belonging among both seasoned and new team members. “I am proud we have maintained our family values approach to life and business as we have grown. Ericom is a family values-based business, true to its word,” reflects Kyle. His pride extends to the long-standing relationships with key figures like Tony Economos, Murat Aydemir, Shane O’Hearn, and Matt Redpath, relationships that have endured for over 25 years.

As Kyle Page stands in the Hall of Fame, his journey from a tech-savvy country kid to the CEO of a $50 million company is not just a personal triumph but a narrative of Ericom’s innovation, and commitment to excellence. The story continues, and with Kyle at the helm, the future is bound to be as bright as his Queensland spirit.”

Share this:

Kyle Page, the driving force behind Ericom's path to excellence.

Kyle Page’s journey to Telstra Hall of Fame

Legal action and the quest for cybersecurity culture

Finding a middle ground: Legal action and the quest for cybersecurity culture.

In the ever-evolving world of cybersecurity, the need for strong protection against cyberattacks is clear. Recent developments show that corporate regulator ASIC is taking a tougher stance on holding board directors and executives responsible for their organisations’ shortcomings in this area.

While this approach might seem promising to boost cybersecurity culture, the situation is far from straightforward. In this article, we’ll dive into the implications of this approach and why achieving the right cybersecurity culture demands a more nuanced perspective.

The changing regulatory landscape

In response to the increasing threat of cyberattacks, regulators are taking a more proactive approach. They aim to set a precedent by pursuing legal action against companies that have suffered security breaches due to their failure to take adequate precautions to protect their customers and infrastructure from hackers. At first glance, this seems like a strong deterrent, sending a clear message that neglecting cybersecurity won’t be tolerated.

However, it is far more complex than a simple risk-and-reward equation. While some attackers are driven by financial gain, others have different motivations, often related to geopolitics. Nation-state actors, for instance, might infiltrate organisations not for monetary gain but for strategic advantage or intelligence gathering. This distinction highlights the multifaceted nature of cyber threats, making it challenging to attribute blame solely to victimised organisations.

The challenge of defining “Recklessness”

Another obstacle is determining what qualifies as “recklessness” in cybersecurity. It is constantly evolving, and the threat landscape is constantly shifting. What might have been considered adequate protection one year could fall short the next? Therefore, labelling an organisation as “reckless” often relies on subjective judgments and the benefit of hindsight. This approach could inadvertently encourage a culture of fear and concealment within organisations, undermining the transparency necessary to protect potential victims.

Instead of concentrating solely on punitive measures, a more balanced approach might involve promoting transparency within organisations. Encouraging companies to openly share information about their cybersecurity practices, vulnerabilities, and breach response plans could foster a collaborative environment for addressing cybersecurity threats. This approach can help organisations learn from one another’s experiences and collectively enhance their defences.

Regulation’s role

Regulation undoubtedly plays a crucial role in cybersecurity, establishing a minimum standard for what is expected of organisations in safeguarding their customers and data. However, achieving the right equilibrium between regulation and cultivating a culture beyond compliance is essential. These regulations should provide a security framework and be adaptable to the ever-changing threat landscape, encouraging proactive measures rather than solely penalising shortcomings.

The intention behind legal action against companies that fall victim to cyberattacks due to inadequate protection is to cultivate a sense of responsibility and preparedness. Nevertheless, the cybersecurity landscape is far from uncomplicated, with numerous motivations behind attacks and a constantly shifting threat environment. While regulations are vital, they shouldn’t discourage organisational transparency and cooperation.

In pursuing a robust cybersecurity culture, striking a balance is imperative. Encouraging open dialogue, sharing best practices, and staying flexible in the face of emerging threats are all essential components of a comprehensive strategy.

Staying proactive and informed is crucial

Ericom is leading the charge by assisting many Australian businesses in compliance with the Australian Cyber Security Centre (ACSC) Essential Eight Maturity Model. By incorporating our managed security services model, we guide these enterprises through each critical step of this indispensable compliance journey and offer ongoing support vital for maintaining a robust cybersecurity posture.

This continuous assistance benefits businesses by providing immediate response to security incidents, ongoing monitoring for threats, and expert advisory on the evolving cybersecurity landscape, ultimately safeguarding your business, board of directors, and executives in a dynamically changing threat environment. Taking proactive measures with Ericom’s support ensures your business is resilient, secure, and aligned with industry-leading best practices, fortifying your defence mechanisms against sophisticated cyber threats.

This is a shared responsibility, and by taking proactive steps, we can collectively create a safer digital environment for all. Don’t wait until it’s too late – act now to protect your business and data.

Share this:

ASIC is pushing for accountability in cybersecurity. Will you be caught in the crossfire?

Legal action and the quest for cybersecurity culture

Dialling Back and Leaping Forward

Dialling Back and Leaping Forward

Remembering three-decades of mobility, from the nostalgic charm of pagers, to embracing the freedom of 5G.

by Dino Haritos

I’m taking a trip down memory lane to share some thoughts on how far we’ve come in the world of mobile technology. While I’m usually looking forward to the future, today feels like the right day to take a step back and appreciate the road so far.

I still remember the days when I was rocking a pager and jumping on my bike in a race against time to search high and low for those elusive red telephone booths. But those phone booths were far from private sanctuaries. We had to share them with the public, including vandals and eavesdroppers. You’d stand there, 50 cents in hand, wondering who else had shared this space with you.

Fast-forward to the analogue mobile phone era, where models like the 007 and 018 came onto the scene and changed everything. We were freed from the phone booth and had the power to connect wherever and whenever we pleased. It was the first time I considered a phone as an extension of myself.

Then came the digital mobility revolution, introducing us to 1G, 2G, and eventually 3G networks with better voice quality and range. Not to mention the birth of SMS! Once I got my first mobile car phone – the Uniden CP1000 – I was happy to wave goodbye to my pager in the rearview mirror.

And now 5G is supporting the flexibility of remote working, with video calling through Microsoft Teams available from the smart computers in our pockets. But as our phone upgrades give us more freedom every year, the more we’re connecting to public Wi-Fi networks when our mobiles aren’t performing at their best. It’s as if we’re stepping back in time and into the old phone booths – shared, and uncertain.

As connecting to public Wi-Fi can be risky business, cybersecurity is more crucial than ever. Freeing ourselves from the traditional office space goes hand-in-hand with a demand for enhanced protection. That’s where mobile threat defence and unified end-point management come into play. Think of them as an extra pair of hands that help safeguard against threats and emerging dangers.

Cheers to the past, the present, and the exciting future ahead. I can’t wait to see how technology will keep unleashing us, but let’s work together to keep the journey secure. Reach out to us at 1300 360 369 number to learn more about mobile threat defence.

Share this:

Capturing Dino's journey: Analog memories to the 5G freedom.

Dialling Back and Leaping Forward

The Essential Eight in Focus

The Essential Eight in Focus

Defending Australian businesses, one cyber strategy at a time.

In today’s digital age, cybersecurity has become a significant concern for Australian businesses, with more cybercrime incidents reported every year. In 2022, small businesses found themselves grappling with an average cost of $39,000 per cybercrime report, while medium-sized businesses faced an even heftier burden of $88,000. To support organisations in countering this problem, the Australian Cyber Security Centre (ACSC) has introduced the ‘Essential Eight’ cybersecurity framework.

As hinted in the name, the Essential Eight consists of eight key areas that can work together to create a defence against the ever-evolving landscape of cyber threats. The success of an organisation’s adoption of these strategies is assessed based on a maturity scale from 0 to 3. Ericom can help organisations choose a level of security that most fits their unique needs, as not all require level 3 maturity. Each strategy addresses a different area of cybersecurity, ensuring a comprehensive approach to safeguarding your digital assets.

Let’s have a look at them in detail:

Application control: Create a list of approved applications within your organisation’s network. Any software not on this list is automatically blocked, preventing potentially harmful applications from running. Application control is particularly effective against malware and unauthorised programs.

Patch applications: Regularly updating software to fix any holes that cyber threats could exploit. Patching applications reduces the risk of attacks by ensuring that software is up-to-date with the latest security enhancements.

Configuring Microsoft Office macro settings: Malicious malware can come through Microsoft Office macros. By configuring Microsoft settings, you can disable macros from running automatically or only allow vetted macros to run, making it harder for malware to infect your network.

User application hardening: Configuring web browsers and other applications to block untrusted content, such as Flash, ads, and Java. By hardening applications, you can reduce the attack area for cyber threats.

Restricting administrative privileges: Only allow necessary personnel to have access to critical parts of the system. This minimises the potential damage if an account is taken over and limits the ability of malware to spread within the network.

Patching operating systems: Similar to patching applications, it’s crucial to regularly update your computer’s main operating systems. Updates often include patches for known vulnerabilities, making it harder for cyber threats to exploit the system.

Multi-factor authentication (MFA): Requires users to provide two or more verification factors to access a resource. MFA makes it much harder for cyber threats to break in, even if they know a password.

Regular backups: Regularly backing up data ensures that your critical information can be recovered in the event of a cyber-attack or data loss. Backups should be performed frequently and tested regularly to ensure they work correctly.

At Ericom, we specialise in assisting our customers in harnessing the Essential Eight framework. Our expertise extends to conducting comprehensive audits, evaluating your organisation’s current Essential Eight maturity, and crafting a customised roadmap to enhance your cybersecurity network. Our end-to-end support ensures that your digital assets remain secure by validating your targeted Essential Eight maturity, providing peace of mind to your whole team.

The Essential Eight is a vital tool in today’s cybersecurity landscape, offering a proactive approach to safeguarding your digital assets. As cyber threats become increasingly advanced, there’s never been a more crucial time to grasp and employ the Essential Eight. Know where your organisation stands in the face of cyber threats by contacting us for an audit today!

Share this:

Stay ahead in the cybersecurity race with Essential Eight as your guide.

The Essential Eight in Focus

Turning tassels and taking on new roles

Turning tassels and taking on new roles

Discover how Ericom transformed my post-graduation plans into a marketing adventure!

by Aliesha Farrington – Marketing Associate

It’s official! I’ve finally emerged from the trenches with double bachelors in Marketing and Social Media from Swinburne University. My rollercoaster through education has been filled with years of hard work and is a testament to the incredible support that Ericom has provided me, sticking by my side like a true ride-or-die.

Throughout my educational journey, Ericom has been more than an employer; they’ve been a partner in my success story. Just earlier this year, they gave me a taste of the magic that is the marketing team when I completed a mind-blowing 3-month part-time internship.

The thrill of crafting killer events, deep diving into online content, and strategically sprinkling our brand into the industry ignited a fire within me that couldn’t be extinguished.

And guess what happened next? Ericom recognised my passion and potential and said, “Aliesha, let’s make some marketing magic together!” Who am I to say no to that?

So, now’s my chance to upgrade my graduation announcement as I’m thrilled to announce that I’m officially joining the marketing team at Ericom!

To my colleagues, you have been my partners in crime. Together, we’ve conquered client services, navigated the twisty road of buzzwords (like how long it took me to understand “BAU”), and shared countless laughs. I am stoked that Ericom has given me the chance to grow, without having to lose my connection to you.

Thank you for being a part of my journey, and here’s to new beginnings. Stay tuned for more updates, because now it’s my turn to support Ericom into our exciting adventures ahead!

Share this:

Caps off to new beginnings!

Turning tassels and taking on new roles

More articles and insights

The benefits of video conferencing for Teams

Are you looking for a way to improve communication and collaboration within your team? At Ericom, we offer the best video conferencing technology on the market, providing a dynamic and engaging experience that breaks down barriers between people. Our tools allow you to connect with anyone, anywhere, and focus on what matters most. With clear …

Making your digital transformation plan a reality

Integrating digital technology can be a complex task, but with the right plan, it’s achievable. Digital transformation is all about transforming your business to become more efficient, effective, and customer-focused by adopting digital technology. It’s a value-driven process that emphasises the importance of delivering value to customers, which can result in streamlined operations, reduced costs, …

Top Ten uses for Unified Communications

Streamline your communications with an all-in-one platform: voice, video, and messaging combined. In today’s business world, effective communication and collaboration are essential for success. Luckily, unified communications (UC) offers an innovative solution to centrally manage communication channels, such as email, video conferencing, and chat. Say goodbye to wasted time coordinating meetings or tracking down colleagues! …

Big bubble floating above a tablet screen

Why choose Fortinet for your Network Security as a Service solution

Unlock the power of your people with tech that brings meetings to life.

male working on a laptop

Social engineering: A hidden threat

Would the sleek social engineering skills of the cyber-criminal penetrate your business networks?  Cybercrime in Australia is a growing threat with very real consequences, in 2021 Australian businesses lost over 33 billion dollars as a result of being compromised by cybercriminals. To put this into more startling terms, a new cybercrime is reported to the …

phone screen with lock icon