fbpx
Security
  • April 24 2018 Secure transfers: do you have an audit trail record attached to your business file transfers?

    Today, IT teams are finding it more challenging than ever to protect critical business data. This is because more data resides in more places, from tablets and mobile phones to notebooks, USB, and cloud storage. As the digital innovation evolves, unfortunately, so do the threat of cyberattacks and other dangerous risks to your company’s valuable Read More…

  • March 29 2018 There are two types of companies: Those who know they’ve been hacked & those who don’t

    “There are only two types of companies: Those that have been hacked and those that will be hacked.” – Robert S. Mueller, III, former Director of the FBI and now Special Counsel into the Russian interference of the USA election, made this famous quote. But almost by the time he made it, it was out of Read More…

  • March 27 2018 To manage rapid growth and capitalise on big ambitions, SMBs need robust security solutions

    One of the unavoidable realities of doing business today is the pervasiveness of cyberattacks, which are a major threat to the security and safety of company data. In fact, the Federal Government estimates that Australian businesses lose a whopping $1 billion to cybercrime each year – a cost that is expected to rise exponentially [1]. Read More…

  • February 12 2018 Everyday IT security measures for SMBs

    There’s no argument about it. Cyber security is tough for small and medium sized businesses. Most SMBs don’t have a dedicated IT staff member, meaning it falls on the owner or manager to be on top of computer security matters. One of the key milestones in cyber security is the upcoming data breach laws in Read More…

  • February 2 2018 NSW Government commits $2m to cyber security

    The NSW Government is investing $2 million in a university-led cyber security network, with the aim being to protect the public sector and industry against cyberattacks. Announced by Minister for Finance, Victor Dominello, the NSW Cyber Security Council will bring together leading scientists and engineers from seven of the state’s universities to: harness the expertise Read More…

  • January 31 2018 A last-minute guide to preparing your business for Australia’s new data breach regulations

    The deadline has been known for more than two years, yet many Australian organisations are still woefully unprepared for new data breach regulations that come into effect next month. From Thursday, 22 February,  the Notifiable Data Breaches Scheme (NDB) will require all organisations that are covered by the Australian Privacy Act to notify individuals whose Read More…

  • January 31 2018 Small businesses face stiff penalties under new data breaches scheme, Ombudsman warns

    With just over three weeks until mandatory data breach reporting laws come into effect, the Australian Small Business and Family Enterprise Ombudsman (ASBFEO), Kate Carnell, has urged small businesses to ensure they are prepared as a matter of urgency.   From 22 February, organisations with personal information security obligations under the Privacy Act 1988 will be Read More…

  • January 19 2018 CX marks the spot: Lessons for restoring trust with customers after a company data breach

    Consumers have become increasingly comfortable with providing personal data to brands in order to receive a personalised experience and seamless customer journey. However, recent news that Uber concealed a data breach affecting 57 million users and drivers for a year, demonstrates the rapid mistrust a brand can generate when it doesn’t adequately protect this data, Read More…

  • November 29 2017 The hacking community is evolving but the security basics still apply for businesses

    They’re often portrayed as socially isolated, disaffected young men tapping keyboards in darkened basements. Motivated by the promise of global notoriety, they spend hours trawling for IT security weaknesses trying to cause disruption and destruction. The reality of hackers today is somewhat different. Often highly educated, many work in loosely connected groups that share knowledge Read More…

  • November 20 2017 Identity verification is vital to modern businesses: get the tools to verify your customers identification quickly and efficiently

    Since the internet revolution, the way we do business has changed beyond recognition. Now we are less likely to have direct contact with clients and customers and face-to-face confirmation that they are who they say they are is no longer an option. This has led to a significant rise in internet fraud, which costs businesses Read More…

  • November 8 2017 The evolution of hacking and how small to medium businesses can respond to the threat

    The popular stereotype of a cyber hacker tends to be a young, highly skilled person sitting in a darkened room surrounded by sophisticated computer equipment. It’s an image honed by Hollywood and often supported by mainstream media. However, increasingly, this is not the case. Hackers can be young or old, male or female, and belong Read More…

  • October 17 2017 Sensitive data hackable via new Wi-Fi exploit

    Serious weaknesses in the security protocol used for all modern protected Wi-Fi networks, both personal and enterprise, have been exposed by a Belgian researcher who warns cyber attackers can gain access to and manipulate sensitive data or even inject malware into a network.      According to Mathy Vanhoef, a doctoral researcher in computer security from Read More…

  • September 26 2017 Businesses safer in cyberspace thanks to $50 million boost into cyber security

    Australian businesses will benefit from increased cyber security through the implementation of a new industry-led cyber security Cooperative Research Centre (CRC), which will receive $50 million in government funding over the next seven years. The funding will leverage more than $89 million from the 25 industry, research and government partners. Assistant Minister for Industry, Innovation Read More…

  • September 12 2017 Six ways to protect your business from an inside threat

    In cyber security, the “Insider Threat” refers to potential actions taken by people within an organisation that can cause harm, as opposed to hackers attacking from the outside. Sometimes an insider takes actions maliciously with intent to steal data or cause damage. In other cases, the insider takes actions accidentally by clicking a link or Read More…

  • September 11 2017 How to diffuse the IT blame game

    How well does your company communicate internally? Specifically, how well do your IT departments communicate with each other?  Enterprises typically contain four or more IT sub departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it’s quite common for them to be at odds with each other, even in good times. Read More…