Comment on the new draft Notifiable Data Breaches scheme

Overview What is the Notifiable Data Breaches scheme? The passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017 established a Notifiable Data Breaches (NDB) scheme in Australia. The NDB scheme requires organisations covered by the Australian Privacy Act 1988 (Privacy Act) to notify any individuals likely to be at risk of serious harm by a data breach. This...
Learn More

Insight – Security Awareness

Information security awareness is one of the most effective ways to protect company data since so many security risks are caused by user error, misconfiguration and mismanagement. The primary goal of such programs is to minimize these issues by changing users behaviour to ensure their responsibilities for ensuring the confidentiality, integrity and availability of information...
Learn More

Companies thrive on talent

Your employees are the key to success in business, especially when you use technology to make them more productive. This access to data and applications can also pose dangers, though. An employee using data inappropriately – either maliciously or unwittingly – can incur reputational, legal and financial risk for your business. In conversations with 304...
Learn More

Culture and Cyber security

The impact of corporate culture on security awareness is often misunderstood. Many companies are training employees with carrots, not sticks. Changing from a “fear “ to a “reward” based culture. Some companies are using games, contests and prizes to train employees on safe practices for cyber security and having great results. Companies are starting to...
Learn More

Social Engineering 101

That firewall or antivirus won’t mean much if your users are tricked into clicking on a malicious link they think came from a Facebook friend or LinkedIn connection. Here’s what you need to know to protect your organisation and your users. Social engineering is essentially the art of gaining access to buildings, systems or data...
Learn More

Cloud Security

By: Colin Bertram Are you utilising cloud computing technologies? Is your firm considering the cloud? Concerned about security? You should be – but don’t let this stop you! Cloud providers generally follow one of three service models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS). Under the...
Learn More

Should security awareness be fun?

Companies experiencing a cyberattack certainly are not thinking about fun when they deal with the results. There’s a good chance that the breach happened because security awareness wasn’t a focus for an employee who simply clicked the wrong link or accessed the wrong website. Employees need to be educated about cyber risks, but training can...
Learn More