Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits these vulnerabilities. We have automatic patching systems to fix vulnerabilities. We implement next generation detection and remediation devices to identify and stop attacks. This is all important, but what’s missing is a recognition that software vulnerabilities aren’t the most … Continue reading Addressing the real vulnerabilities
The cyber security of any organisation can only ever be as strong as its weakest link. The biggest vulnerabilities of a system are not necessarily found within hardware or software, but rather with the people who use it. IBM’s 2015 Cyber Security Intelligence Index reports that 95% of cyber security breaches are due to human … Continue reading Humans in cyber security – the weakest link
On 11 April 2016, the Privacy Commissioner released a guide to deal with issues associated with data breaches. This is aimed at entities regulated by the Privacy Act 1988 (Cth) in order to assist them with complying with the Australian Privacy Principles. When (and it is likely to be a matter of when and not … Continue reading Privacy Commissioner Releases a Guide To Deal With Data Breaches
Most professionals don’t have to worry about thieves arriving and stealing everything that isn’t nailed down the floor. There are still security concerns, of course, but most of them now revolve around cyber crime and the potential disaster of a data breach. These fears are well founded, as cyber crime amounts to billions of dollars … Continue reading Anatomy of a Data Breach: How the Cyber criminals get in.