Overview What is the Notifiable Data Breaches scheme? The passage of the Privacy Amendment (Notifiable Data Breaches) Act 2017 established a Notifiable Data Breaches (NDB) scheme in Australia. The NDB scheme requires organisations covered by the Australian Privacy Act 1988 (Privacy Act) to notify any individuals likely to be at risk of serious harm by a data breach. This … Continue reading Comment on the new draft Notifiable Data Breaches scheme
It has been a mantra for so long that it’s a cliché: Humans are the weakest link in the cyber security chain. The best technology in the world can’t protect an organization from an employee and top management falling for a well-crafted social media or phishing attack. We have invested a huge amount of … Continue reading How much time are you spending on your staff?
Information security awareness is one of the most effective ways to protect company data since so many security risks are caused by user error, misconfiguration and mismanagement. The primary goal of such programs is to minimize these issues by changing users behaviour to ensure their responsibilities for ensuring the confidentiality, integrity and availability of information … Continue reading Insight – Security Awareness
Your employees are the key to success in business, especially when you use technology to make them more productive. This access to data and applications can also pose dangers, though. An employee using data inappropriately – either maliciously or unwittingly – can incur reputational, legal and financial risk for your business. In conversation with 304 … Continue reading Companies thrive on talent.
The impact of corporate culture on security awareness is often misunderstood. Many companies are training employees with carrots, not sticks. Changing from a “fear “ to a “reward” based culture. Some companies are using games, contests and prizes to train employees on safe practices for cyber security and having great results. Companies are starting to … Continue reading Culture and Cyber security
Small-business owners often don’t believe they are of interest to hackers, but half of all small- to medium-sized businesses were hacked in 2016. Small-business owners often don’t believe they are of interest to hackers, but a recent Ponemon survey found that in 2016 half of all small- to medium-sized businesses were hacked. Those are businesses … Continue reading In small businesses, build a culture of security by harnessing the power of your employees
That firewall or antivirus won’t mean much if your users are tricked into clicking on a malicious link they think came from a Facebook friend or LinkedIn connection. Here’s what you need to know to protect your organisation and your users. Social engineering is essentially the art of gaining access to buildings, systems or data … Continue reading Social Engineering 101
By: Colin Bertram Are you utilising cloud computing technologies? Is your firm considering the cloud? Concerned about security? You should be – but don’t let this stop you! Cloud providers generally follow one of three service models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS). Under the … Continue reading Cloud Security
Companies experiencing a cyberattack certainly are not thinking about fun when they deal with the results. There’s a good chance that the breach happened because security awareness wasn’t a focus for an employee who simply clicked the wrong link or accessed the wrong website. Employees need to be educated about cyber risks, but training can … Continue reading Should security awareness be fun?
One of the most fatal mistakes an organization can make is thinking cyber attackers are the same caliber of criminal as the juvenile delinquents shoplifting and asking for cigarettes at the local mall. Sure, some hackers are just as pathetic, but these aren’t the ones your business (should) need to worry about. With this in … Continue reading Third party hacking