In an era where the average cost of a single malware attack on a company has risen to a catastrophic $2.4 million, it's safe to say that cybersecurity has never been more important than it is right now. But at the same time, this demands the question: in a world where even large corporations like Yahoo and Uber can become victims overnight, what chance does your small business really have?
Read Post
TAGS:
it security,
cyber security,
business,
end user,
passwords,
two factor authentication,
risk
Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.
Read Post
TAGS:
cyber security,
essential 8,
strategy,
it strategy,
implementation,
tips,
webinar,
risk,
it security
Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.
Read Post
TAGS:
legislation,
risk,
business continuity planning,
IT systems,
leadership,
disaster recovery planning,
cyber security,
it strategy,
it security,
notifiable data breaches scheme
Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.
Read Post
TAGS:
legislation,
risk,
business continuity planning,
IT systems,
leadership,
disaster recovery planning,
cyber security,
it strategy,
it security,
notifiable data breaches scheme
We've discussed what the notifiable data breach laws entail, why they exist, and why they'll be so important to both businesses and private citizens across the country moving forward. But to put it simply, no single mitigation strategy is guaranteed to A) apply to every type of business, or B) prevent every type of cybersecurity incident that you may encounter.
Read Post
TAGS:
legislation,
risk,
business continuity planning,
IT systems,
leadership,
disaster recovery planning,
cyber security,
it strategy,
it security,
notifiable data breaches scheme
It's official: the February 22, 2018 deadline has come and gone and Australia's new data breach notification laws are now in full effect. If you still feel unsure about what these new laws entail, or if you were only scarcely aware that they existed in the first place, don't worry — it’s not too late to be informed.
Read Post
TAGS:
legislation,
risk,
business continuity planning,
IT systems,
leadership,
disaster recovery planning,
cyber security,
it strategy,
it security,
notifiable data breaches scheme
As the financial year draws to a close once again, many companies have significant portions of their budget left over and, as a result, are looking for the best possible ways in which to spend it. Despite this, far too many business leaders continue to overlook one of the most obvious — and effective — ways to do precisely that.
Read Post
TAGS:
hardware,
workstations,
risk,
infrastructure,
IT systems
In a world where damages from cyber crime represents the largest transfer of economic wealth in human history and with 230,000 new malware samples launching online every single day, the need to have skilled, trained, and forward-thinking tech teams at the heart of your business is not only important, but essential.
Read Post
TAGS:
it strategy,
employees,
risk