Home Tech Security

Security

Making informed security choices amid the growing reach of digital

Digital technology and cloud services are so ubiquitous today we often take easy access to services for granted without considering our information security first....

Getting smarter: why it pays to protect yourself and your data online in 2019

Once upon a time, it was the stuff of espionage and thriller films – a la Tron, Enemy of the State and The Bourne...

Help! My bank account’s been cleaned out by another ‘me’

Mistaken identity is a perennial movie plot. Who can forget the classic suspense flick, North by Northwest which has ad man Cary Grant on the...

Avoiding the two most common security risks for your device

Advanced digital technology has reached a point where it has become a key and inseparable part of our lives, but it is not without...

Cyber security tips for a hacker-free winter holiday

Top ways to enjoy a hacker-free holiday.

How to protect your business from ransomware cyber attacks

How to protect your business from ransomware attacks.

Should the EU General Data Protection Regulation become the global privacy standard? What does the GDPR mean for your business?

Do we always know when companies collect personal information about us? When we choose to provide personal information, do we know how it will...

Investment scams cost Australians $64 million in 2017

The ACCC is warning investors to be wary of scammers after its 9thannual ‘Targeting scams report’ revealed that Investment scams had increased by more...

Is your business the victim of cryptojacking?

Cryptojacking – where cybercriminals hijack CPU power and electricity from unsuspecting computer users to mine cryptocurrencies – can cripple a company’s network, increasing their...

Why the key to withstanding data breaches in your SME is reducing how much data you store

Amid a flurry of high-profile attacks and the tightening of privacy regulations, organisations are increasingly seeking ways to minimise the risk of suffering a...

Secure transfers: do you have an audit trail record attached to your business file transfers?

Today, IT teams are finding it more challenging than ever to protect critical business data. This is because more data resides in more places,...

There are two types of companies: Those who know they’ve been hacked & those who don’t

“There are only two types of companies: Those that have been hacked and those that will be hacked.” – Robert S. Mueller, III, former Director...

To manage rapid growth and capitalise on big ambitions, SMBs need robust security solutions

One of the unavoidable realities of doing business today is the pervasiveness of cyberattacks, which are a major threat to the security and safety...

Everyday IT security measures for SMBs

There’s no argument about it. Cyber security is tough for small and medium sized businesses. Most SMBs don’t have a dedicated IT staff member,...

NSW Government commits $2m to cyber security

The NSW Government is investing $2 million in a university-led cyber security network, with the aim being to protect the public sector and industry...

A last-minute guide to preparing your business for Australia’s new data breach regulations

The deadline has been known for more than two years, yet many Australian organisations are still woefully unprepared for new data breach regulations that...

Small businesses face stiff penalties under new data breaches scheme, Ombudsman warns

With just over three weeks until mandatory data breach reporting laws come into effect, the Australian Small Business and Family Enterprise Ombudsman (ASBFEO), Kate...

CX marks the spot: Lessons for restoring trust with customers after a company data breach

Consumers have become increasingly comfortable with providing personal data to brands in order to receive a personalised experience and seamless customer journey. However, recent...

The hacking community is evolving but the security basics still apply for businesses

They're often portrayed as socially isolated, disaffected young men tapping keyboards in darkened basements. Motivated by the promise of global notoriety, they spend hours...

Identity verification is vital to modern businesses: get the tools to verify your customers identification quickly and efficiently

Since the internet revolution, the way we do business has changed beyond recognition. Now we are less likely to have direct contact with clients...