Blog Posts by Leon Friend,Principal Sales Engineer, APAC

Leon Friend,Principal Sales Engineer, APAC

A veteran of the Australian IT Industry with over 28 years’ experience, including 14+ years in Cybersecurity (Network and End Point Protection).

  

Leon is also a certified instructor, providing technical training to reseller System Engineers in Australia, New Zealand, China, South Korea and Hong Kong as well as end users and project teams. 

 

More recently Leon has focussed on network security with channel enablement through education and supporting activities around solution design, customer engagements, as well as offer definition and marketing initiatives. 

 

Leon holds over 31 licenses and certifications, including a Graduate Certificate in Information Systems Security from Charles Sturt University. 

Filter By:
03/22/2023
3 min read
The ACSC Essential Eight in review
We’ve covered all the ACSC Essential Eight mitigation strategies and implementation in detail—but how does it impact your MSP and your customers? Read to learn more.
security general icon
Cybersecurity
02/23/2023
4 min read
ACSC Essential Eight, Regular Backups
To recover quickly after a cybersecurity incident, it’s essential to have regular backups. Read the blog to learn more about conducting regular backups and how to keep backup data secure.
security general icon
Cybersecurity
01/18/2023
4 min read
ACSC Essential Eight, Multi-factor Authentication (MFA)
Having a multi-factor authentication (MFA) strategy can help prevent hackers from using compromised credentials to penetrate your environment. Read the blog to learn more about implementing different levels of MFA based on your clients’ cyber risks.
security general icon
Cybersecurity
12/21/2022
4 min read
ACSC Essential Eight, Patch Operating Systems
An operating system enables the interaction between a computer’s hardware, software, and services—which makes them an attractive target for attackers. Read the blog to learn how patching operating systems can help harden your environment.
security general icon
Cybersecurity
11/16/2022
4 min read
ACSC Essential Eight, Restrict Administrative Privileges
Stop malicious actors from gaining easy access to your information. Read the blog to learn how restricting administrative privileges can help secure your environment and keep you protected against cyber threats.
security general icon
Cybersecurity
10/19/2022
4 min read
ACSC Essential Eight, user application hardening
Browsers are an essential tool for accessing and interacting with content online—but this is also what makes them a risk. Read the blog to learn how user application hardening can help secure the browser.
security general icon
Cybersecurity
09/21/2022
5 min read
ACSC Essential 8, Configure Microsoft Office Macro Settings
Cyberattacks through malicious macros have increased. It is essential to control and configure macro settings to ensure sufficient cybersecurity. Read part 4 of the Essential 8 deep dive series to learn more.
security general icon
Cybersecurity
08/17/2022
5 min read
ACSC Essential 8, patch applications
Your users may neglect to maintain their applications so if you want to build their cyber resilience, it’s essential that you help them with patch applications. Read the blog to learn more.
security general icon
Cybersecurity

Browse More Blog Authors

Amy Lucia
Amy Lucia
Chief Marketing Officer (2021-2023)
Read More >>
Arlin Sorensen
Arlin Sorensen
VP of Ecosystem Evangelism, ConnectWise
Read More >>
Geoffery Willison
Geoffrey Willison
Chief Operating Officer, ConnectWise
Read More >>
Jeff Bishop
Jeff Bishop
EVP & GM, Product Management and Asio Platform, ConnectWise
Read More >>
Jeff Bishop
Jeff Bishop
Chief Product Officer, ConnectWise, ConnectWise, LLC.
Read More >>
Jeff Bishop
Jeff Bishop
EVP & GM, Product Management and Asio Platform, ConnectWise, ConnectWise, LLC.
Read More >>
Kevin Prince
Founder and CEO, StratoZen
Read More >>