Elicitation has been a topic of increased interest lately, both from the perspective of cyber espionage as well as in our normal, day to day lives. The digital age provides endless arrays of access points to our personal and sensitive information, and with our minds being pulled into so many directions, we don’t always take … Continue reading elicitation (n.) stimulation that calls up (draws forth) a particular class of behaviours.
Overview What is the Notifiable Data Breaches scheme? The passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017 established a Notifiable Data Breaches (NDB) scheme in Australia. The NDB scheme requires organisations covered by the Australian Privacy Act 1988 (Privacy Act) to notify any individuals likely to be at risk of serious harm by a data breach. This … Continue reading Comment on the new draft Notifiable Data Breaches scheme
It has been a mantra for so long that it’s a cliché: Humans are the weakest link in the cyber security chain. The best technology in the world can’t protect an organization from an employee and top management falling for a well-crafted social media or phishing attack. We have invested a huge amount of … Continue reading How much time are you spending on your staff?
Information security awareness is one of the most effective ways to protect company data since so many security risks are caused by user error, misconfiguration and mismanagement. The primary goal of such programs is to minimize these issues by changing users behaviour to ensure their responsibilities for ensuring the confidentiality, integrity and availability of information … Continue reading Insight – Security Awareness
Your employees are the key to success in business, especially when you use technology to make them more productive. This access to data and applications can also pose dangers, though. An employee using data inappropriately – either maliciously or unwittingly – can incur reputational, legal and financial risk for your business. In conversations with 304 … Continue reading Companies thrive on talent
The impact of corporate culture on security awareness is often misunderstood. Many companies are training employees with carrots, not sticks. Changing from a “fear “ to a “reward” based culture. Some companies are using games, contests and prizes to train employees on safe practices for cyber security and having great results. Companies are starting to … Continue reading Culture and Cyber security
Small-business owners often don’t believe they are of interest to hackers, but half of all small- to medium-sized businesses were hacked in 2016. Small-business owners often don’t believe they are of interest to hackers, but a recent Ponemon survey found that in 2016 half of all small- to medium-sized businesses were hacked. Those are businesses … Continue reading In small businesses, build a culture of security by harnessing the power of your employees
That firewall or antivirus won’t mean much if your users are tricked into clicking on a malicious link they think came from a Facebook friend or LinkedIn connection. Here’s what you need to know to protect your organisation and your users. Social engineering is essentially the art of gaining access to buildings, systems or data … Continue reading Social Engineering 101
By: Colin Bertram Are you utilising cloud computing technologies? Is your firm considering the cloud? Concerned about security? You should be – but don’t let this stop you! Cloud providers generally follow one of three service models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS). Under the … Continue reading Cloud Security