<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=455441907967559&amp;ev=PageView&amp;noscript=1">

News & Views

Your Guide to the ASD Essential 8 Strategies (And How to Implement Them)

by John Lane - Nov 29, 2018

Cybersecurity attacks are a major threat to every business. That said, many businesses aren’t aware of the basics of how to protect themselves against these common threats. A breach in security can be catastrophic for a business’s reputation and bottom line.

Read Post
0 Comments

TAGS: cyber security, essential 8, strategy, it strategy, implementation, tips, webinar, risk, it security

Australia’s Data Breach Notification Laws Part 4: What's Next?

by John Lane - Jun 21, 2018

Now that we’ve reached the end of this four-part series on Australia's new data breach notification laws, the only thing left to do is to tie it all together: which means getting started on building a better, stronger business that is better able to counter cybersecurity risks as much as possible.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 3: Developing a Data Breach Response Plan

by John Lane - Jun 18, 2018

Now that you're aware of what the data breach laws mean and how to protect your business, it's time to focus on arguably the most important cybersecurity task: developing a data breach response plan for when that terrible day finally arrives.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 2: How to Protect Your Business

by John Lane - Jun 18, 2018

We've discussed what the notifiable data breach laws entail, why they exist, and why they'll be so important to both businesses and private citizens across the country moving forward. But to put it simply, no single mitigation strategy is guaranteed to A) apply to every type of business, or B) prevent every type of cybersecurity incident that you may encounter. 

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

Australia’s Data Breach Notification Laws Part 1: What It Means and Why It Matters

by John Lane - Jun 14, 2018

It's official: the February 22, 2018 deadline has come and gone and Australia's new data breach notification laws are now in full effect. If you still feel unsure about what these new laws entail, or if you were only scarcely aware that they existed in the first place, don't worry — it’s not too late to be informed.

Read Post
0 Comments

TAGS: legislation, risk, business continuity planning, IT systems, leadership, disaster recovery planning, cyber security, it strategy, it security, notifiable data breaches scheme

The Major Benefits of Replacing Old Hardware: What You Need to Know

by John Lane - Jun 7, 2018

As the financial year draws to a close once again, many companies have significant portions of their budget left over and, as a result, are looking for the best possible ways in which to spend it. Despite this, far too many business leaders continue to overlook one of the most obvious — and effective — ways to do precisely that.

Read Post
0 Comments

TAGS: hardware, workstations, risk, infrastructure, IT systems

Understaffed Tech Teams: What You Need to Know

by John Lane - May 16, 2018

In a world where damages from cyber crime represents the largest transfer of economic wealth in human history and with 230,000 new malware samples launching online every single day, the need to have skilled, trained, and forward-thinking tech teams at the heart of your business is not only important, but essential.

Read Post
0 Comments

TAGS: it strategy, employees, risk