Melbourne (03) 8672 2974 - Sydney (02) 8123 3003 - Brisbane (07) 3054 4312
information@layer8security.com.au

Employee Awareness of IT Security Threats

Employee awareness of IT security threats depends on their position, company size, and industry. Use this report to answer 5 main questions about companies’ IT security policies and employee awareness of IT security threats. In the digital economy, company data and processes become the domain of IT services. As a result, IT security and management now...
Learn More

What role does HR play in cyber security?

Cybersecurity is increasingly becoming a whole-of-business issue, including HR. Historically, cybersecurity has been primarily handled in the IT space. However, these days HR has an important seat at the table in terms of the holistic business-wide approach to addressing cyber security. If you look traditionally at where HR has played a role in cybersecurity, it has...
Learn More

Don’t get caught by Phone Scams

Have you been getting missed calls from overseas numbers or people pretending to be from Centrelink or the Australian Taxation Office? These are just some examples of common phone scams that have occurred over the past few months, which have conned many Aussies into parting with their hard-earned cash. Here’s what you should do if...
Learn More

Lifting Australia’s cyber security game

National Data Breach Scheme disclosure law will hopefully lift Australia’s cyber security game Australia will kick off the cyber security year with a bang when its new data breach disclosure legislation comes into effect on 22nd February 2018. The mandatory data breach notification law underscores Australia’s recent efforts to lift its cyber security game both locally and...
Learn More

Top 10 Social Engineering Techniques

If someone you trusted has ever tricked you, you know what it feels like to be socially engineered. Today we will explain both the technical and non-technical techniques used by social engineers today to gain trust and manipulate people for their benefit. The easiest way to get into a computer system is to simply ask...
Learn More

Comment on the new draft Notifiable Data Breaches scheme

Overview What is the Notifiable Data Breaches scheme? The passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017 established a Notifiable Data Breaches (NDB) scheme in Australia. The NDB scheme requires organisations covered by the Australian Privacy Act 1988 (Privacy Act) to notify any individuals likely to be at risk of serious harm by a data breach. This...
Learn More