Network Security — Opinions

Buyer Beware: Five Cybersecurity Consumer Tips for the Holiday Season

Last year, news that US retailer Target’s point-of-sale systems were compromised resulting in the theft of more than 40 million payment card numbers hit Australian headlines. A steady stream of breach stories throughout the year further raised awareness of the issue in this part of the world. But given there are no mandatory breach disclosure laws in this country, you may be wondering ‘If my details were stolen, how would I even know?’ Practically speaking, you’re probably thinking ‘What can I do to protect myself this festive season?’

Chris Pogue | 10 Dec | Read more

How Can Organisations Deal Intelligently with Information Security Breaches?

Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.

Steve Durbin | 13 Nov | Read more

Smart Cities deliver Innovation & Security

Smart city projects are among the most exciting technological initiatives around today and will play a major role in the world’s future growth and security. Modern technology lets us track and monitor many elements in a major urban environment – noise, light, traffic, weather, accidents and incidents, and use this data to improve people’s living and working conditions.

Gordon Makryllos | 24 Oct | Read more

Incident Response Plan

Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.

Dr Claudia Johnson | 23 Oct | Read more

The cost of a security breach; it’s not just about the purse strings

Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.

Brett Moorgas | 08 Oct | Read more

Dispelling Common Myths Surrounding UTM

Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.

Wana Tun | 03 Oct | Read more

Navigating the balancing act: how to support user privacy whilst maintaining control of corporate-owned data

It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism

David Balazsy | 03 Oct | Read more

Cyber crime in financial institutions

What is cyber crime? There are a number of different ways that criminals are trying to target financial institutions. There is social engineering exploits, which is when an end-user gets an email claiming to be from their bank, but it’s really a cyber criminal. Within that email there is a link asking the end-user to confirm their account information. Cyber criminals then leverage the credentials to gain access to the user’s financial records and banking accounts. Malware is another piece to it, where criminals distribute malicious software and a user is tricked into installing a keylogger or screen scraper program on their device. This means that when an end-user enters their credentials, the program can capture all that information, allowing criminals to gain access to the account.

Crispin Kerr | 03 Oct | Read more

Why its time to upgrade to a next generation firewall

Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:

CSO staff | 31 Aug | Read more

Opinion: Cyber-Security – Stay Smart Online

Australians are increasingly relying on the internet in their everyday lives, from banking and shopping, through to using emails, social networking and blogs to keep in touch with family and friends. They are using a range of devices such as smart phones, tablets, computer game consoles and other devices to go online.

Sabeena Oberoi | 15 Jul | Read more