Cyber security is the double edged sword of modern business. Because the Internet is an evolving technology that carries enormous potential and vulnerability, cyber security embraces questions of internet freedom, network architecture and the economic potential of cyberspace
Gordon Makryllos |
09 Apr |
Read more
Information Security, IT Security, Technology Security, IT Risk and Security and IT Risk Services are all names that organisations use to define a functional unit within their enterprise that is responsible for the security, integrity and operational assurance of their information assets and operating environment.
Puneet Kukreja |
15 Mar |
Read more
The NSW Government Digital Information Security Policy (version 1.0, dated November 2012) requires that all NSW Government Departments, Statutory Bodies and Shared Service Providers must have an Information Security Management System (ISMS) based on a comprehensive assessment of the risk to digital information and digital information systems.
Mark Jones and Russell Clarke |
26 Feb |
Read more
Despite our desire for simplicity, IT continues to become more complex. Decentralised applications or client-server models have become the norm. Smartphones and tablets are pushing mobile computing into a new era and changing user behaviour. Cloud has significantly altered the way we provide IT solutions and how we meet business needs with technical solutions.
Gordon Makryllos |
30 Jan |
Read more
In my last CSO blog I posted about the Australian Federal Governments recent proposal that requires Internet Service Providers to retain their customers’ activity logs for a period of two years.
Matt Tett |
05 Dec |
Read more
Cyber security remains one of the most dynamic fields within the technology industry. Because of the financial and political impact of cybercrime, attackers are continuously looking to innovate and outsmart security vendors and consulting companies. As a result, the IT community is perpetually engaged in a contest of strategy to combat new cyber threats. These are some of the top security threats we can expect to see developing over the next year, including top tips to combat these dangers.
Gordon Makryllos |
05 Dec |
Read more
Six tips to help get the efficient and secure management of mobile devices under control.
Gordon Makryllos |
10 Oct |
Read more
Mobility has become a key part of business operations in recent years. Smartphones and tablets have become an accepted part of everyday business as the workforce becomes more and more dispersed, with managers expecting their employees to remain connected and productive while they are away from the office.
Gordon Makryllos |
12 Sep |
Read more
Next time you are sitting in a coffee shop, waiting for that flight or riding the office elevator using your mobile device, consider this; how secure is that mobile device? Could it be possible that your mobile device is spying on you?
Murray Goldschmidt |
16 Aug |
Read more
There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.
Gordon Makryllos |
09 Aug |
Read more
Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.
Anton Koren |
14 Jul |
Read more
Most modern day cyber attacks tend to target organisations and governments with the explicit purpose of stealing information and causing disruption. As a consequence, governments have had to reassess their stance on cyber crime, and many are attempting to tackle the problem directly.
Ian Hyndman |
11 Jul |
Read more