Cyber Security 7 ways deepfake voice attacks bypass MFA (and how to respond)

Deepfake voice attacks bypass multi-factor authentication by exploiting identity verification processes rather than breaking authentication controls.... Read more

Automation The Neural Link | Edition 15

Welcome to the latest edition of The Neural Link! Read more

Cyber Security The Missing Link takes CrowdStrike’s ANZ partner title

It’s easy to treat partner awards as a moment, but they usually reflect something that’s been building for a while. This year’s CrowdStrike ANZ... Read more

Our Services How to use leftover EOFY IT budget to secure delivery

What should you do with leftover end of financial year (EOFY) IT budget? The most effective way to use leftover EOFY IT budget is to commit it to... Read more

IT & Cloud Modern Service Desk: How to Improve IT Support Efficiency

If your IT help desk still runs on outdated workflows and clunky ticketing systems, it’s likely slowing your business down. In hybrid, always-on... Read more

Cyber Security Why your SOC isn’t keeping up with modern threats

A Security Operations Centre (SOC) struggles to keep up with modern threats. Attacks now move much faster and at a greater scale, while most SOCs... Read more

Our Team 5 minutes with Tiphanie Berthomiere

Meet Tiph Berthomiere - Account Executive at The Missing Link At The Missing Link, our people are what set us apart. Their expertise, commitment, and... Read more

Our Team A day in the life: Project Management in IT

Project management often gets reduced to timelines and status reports. In reality, it’s the difference between projects that move forward and... Read more

Cyber Security 5 lessons from CISO Critical Infrastructure Melbourne

At the CISO Critical Infrastructure Melbourne conference, similar themes emerged across multiple sessions. Organisations are investing in security,... Read more

Automation The AI productivity paradox explained: From adoption to value

Artificial intelligence is now embedded across most organisations. Tools such as Microsoft 365 Copilot, ChatGPT, and other generative AI platforms... Read more

Cyber Security Top AI security vulnerabilities in 2026 and how to mitigate them

LLMs have expanded what’s possible in web application development. As adoption grows, so does the risk of deploying them insecurely. Read more

IT & Cloud Secure your data: The importance of backup and how to get it right

World Backup Day on 31 March is a reminder to review your backup strategy. However, backup and disaster recovery are not one-time tasks. It is an... Read more