About SaintyLaw

This author has not yet filled in any details.
So far SaintyLaw has created 45 blog entries.

Crowd-sourced equity funding – a new way to raise capital

The Corporations Amendment (Crowd-sourced Funding) Act 2017 which commenced operation on 29 September 2017, aims to bridge the ‘capital gap’ experienced by many small businesses and start-ups as they struggle to finance further development using traditional avenues.[1] Under the new legislation, Australian unlisted public companies with an annual turnover and gross assets of less

2018-01-18T15:34:26+00:00December 14th, 2017|

The First Line of Defence Against Cyber Criminals

In this blog, we discuss the importance of organisational culture to cyber resilience and security. While technical safeguards are important, the rise of social engineering as a method of breaching an organisation’s security means that technical solutions alone are likely to be ineffective.  Consequently, employees are often your organisation’s first line of defence to

2017-12-14T12:19:34+00:00September 11th, 2017|

Techniques for Cyber Testing your Technology Infrastructure

It’s no secret that constantly evolving security threats pose dangers to your organisation, but you may not be aware of the high rate of occurrence of cyber attacks and the likelihood that your organisation’s ‘secure’ network system may be targeted next. A recent report by Rapid7, an IT security company, found that two thirds

2017-06-06T17:27:54+00:00June 6th, 2017|

ASD’s Essential Eight to Mitigate Cyber Security Incidents

In February 2017, the Australian Signals Directorate (ASD) expanded its Top Four cyber threat mitigation measures to the “Essential Eight”. What are the measures, what has changed, what is new and what do they all mean? The Australian Signals Directorate The ASD is responsible for providing cyber security guidance and setting policies for all

2017-05-16T13:08:39+00:00May 16th, 2017|

Cybersecurity: The Regulatory Environment

The cost of a cyber incident can be enormous. Beyond the costs associated with the technical investigation for determining the cause of the cyber incident, organisations will also have to fork out money for securing ICT infrastructure and making cyber security improvements. And the costs don’t stop there, with many indirect or flow-on costs

2017-04-25T13:34:37+00:00March 21st, 2017|