The E-Commerce Cyber Security Advantage
The retail industry is a prime target for fraud and data breaches – it is the second most targeted sector aside from finance.
Rick Chavie | 18 Nov | Read more
The retail industry is a prime target for fraud and data breaches – it is the second most targeted sector aside from finance.
Rick Chavie | 18 Nov | Read more
The biggest cyber-security threat to your business is the people within it. That’s right – the same employees whom you rely on for productivity and profits are also a major weakness when it comes to protecting your operations and information.
Nicole Pauls | 18 Nov | Read more
All of us are, to some extent, slaves to technology. Judicious use of technology is mandated. Human kind has, so far, been naïve in adopting technology with the presumption that it will always be used in the right spirit, but we have seen it being used in the wrong context over and over again. This article is about the implications of malicious use of pervasive technology.
Shantanu Bhattacharya | 13 Nov | Read more
Data breaches are happening more frequently, compromising larger volumes of data than ever before. We seem to hear about new data breaches every day. The number of compromised records grows, while organisations are subjected to larger financial penalties, stronger legislative and regulatory scrutiny, and tangible reputational damage. For organisations that suffer a breach, responding in an intelligent and confident manner is critical.
Steve Durbin | 13 Nov | Read more
According to figures from the Australian Bureau of Statistics, 83% of the Australian population accessed the internet last year, and in the workplace, more and more time is spent online.
Andrew Avanessian | 11 Nov | Read more
Do you take a fatalistic approach to cyber attack? ‘Whatever will be, will be’ is an attitude in life (and movies) that is well suited to events that evoke a spontaneous response—like who will you marry? These are the questions posed in Doris Day’s song from the Hitchcock movie ‘The Man Who Knew Too Much’. They’re not appropriate for incidents which inspire fear, which Doris learns when her son is kidnapped.
Dr Claudia Johnson | 23 Oct | Read more
When it comes to network security, preventive measures like firewalls are necessary, but they’re not enough.
Jason Riddle | 22 Oct | Read more
Security breaches are rarely out of the news and with these reports come the significant costs resulting from each attack. However, the immediate thought is often associated with a dollar amount; for example how much money are we forfeiting through lost sales? Consequently, many think that private enterprises are the only ones that are prone to be at risk of attacks on their networks. The fact is public sector, educational institutions and non-profit organisations are just as much at risk and the potential costs are both great and varied.
Brett Moorgas | 08 Oct | Read more
While the rise of mobile enterprise adoption and BYOD means more flexibility for employees and generally higher productivity for organisations and businesses, it also poses security challenges, in particular around identity and access management (IAM).
Travis Greene | 07 Oct | Read more
Unified Threat Management (UTM) has become popular among organisations since its emergence over five years ago. The security solution gained traction with its all-in-one approach, combining several security tools into a single device. Running UTM also saved companies, especially the smaller ones time, money and manpower. Most UTM today include a firewall, intrusion detection system (IDS), virtual private network (VPN), anti-malware, anti-spam, content and web filtering, while some vendors include other features such as advanced routing.
It goes without saying that government surveillance news dominates our media. From a global standpoint, the NSA leaks brought international attention to state organised spying. Locally, the Australian Government has been making headlines over its plans to develop legislation that will allow it to more easily access metadata from large organisations and telecoms providers to gain information on the consumers using their services in a bid to prevent acts of terrorism
David Balazsy | 03 Oct | Read more
What is cyber crime? There are a number of different ways that criminals are trying to target financial institutions. There is social engineering exploits, which is when an end-user gets an email claiming to be from their bank, but it’s really a cyber criminal. Within that email there is a link asking the end-user to confirm their account information. Cyber criminals then leverage the credentials to gain access to the user’s financial records and banking accounts. Malware is another piece to it, where criminals distribute malicious software and a user is tricked into installing a keylogger or screen scraper program on their device. This means that when an end-user enters their credentials, the program can capture all that information, allowing criminals to gain access to the account.
Crispin Kerr | 03 Oct | Read more
Traditional ways of doing business have changed. Or, to be rather brutally accurate, they have been disrupted.
Gordon Makryllos | 04 Aug | Read more
The year 2014 will be where current trends will accelerate the transformation already underway in how we consume information and do business and live. Organisations will need to evaluate their information strategy to take advantage of the emerging opportunities.
Gordon Makryllos | 09 Dec | Read more
Balancing security priorities with business flexibility and agility is a tough challenge. But it’s a challenge every executive management team faces as it strives to drive business growth, achieve competitive advantage and maximise operational efficiency.
Ammar Hindi | 06 Dec | Read more
The term unified communication (UC) is a popular subject that has been floating around the workplace for some time….but is it really an essential component for businesses today? Do employees, or businesses for that matter, really understand the pros and cons?
Gordon Makryllos | 30 Sep | Read more
Technology, as we knew it, is no longer relevant. Every day we are bowled over with a new app, toy or technique. We are moving to a world of smart technology at a pace that is almost impossible to keep up with.
Gordon Makryllos | 21 Aug | Read more
Cloud computing comes with many key decision and considerations. There are decisions to be made around whom to choose, what to look for and what specific service it is that you ultimately need for your organisation.
Gordon Makryllos | 04 Jul | Read more
The speed at which IT is developing and the general nature of modern business means that many enterprises rely on specialists to manage our systems and applications. Economic and competitive pressures have made it imperative for organisations of all sizes to focus on their core competencies and turn to third-parties to assume responsibility for key corporate functions. The most common form of outsourcing is the cloud. The cloud simplifies many aspects of IT and the business services world.
Gordon Makryllos | 21 May | Read more
Cyber security threats are on the rise. As a result, there is a focus on systems managing the critical infrastructure that everyone depends upon. Critical infrastructure is loosely defined as assets essential for the economy and overall society to function.
Wayne Chung | 01 May | Read more