Loading...

Crowd-sourced equity funding – a new way to raise capital

The Corporations Amendment (Crowd-sourced Funding) Act 2017 which commenced operation on 29 September 2017, aims to bridge the ‘capital gap’ experienced by many small businesses and start-ups as they struggle to finance further development using traditional avenues.[1] Under the new legislation, Australian unlisted public companies with an annual turnover and gross assets of less

2018-01-18T15:34:26+00:00December 14th, 2017|

Tips for Improving Your Organisation’s Cyber Resilience

In 2012, Robert Mueller, FBI Director famously said that he was “convinced that there are only two types of companies: those that have been hacked and those that will be.”[1]  The statement’s relevance in 2017 is evident – it is inevitable that your organisation will experience a cyber incident, however the focus has shifted. 

2017-06-06T16:59:15+00:00February 7th, 2017|

The Cost of Cyber Complacency

Within the rapidly globalising and integrated global community, the evolution and rationalisation of technology has presented the real and present danger of cyber-attacks, creating a threat environment for all businesses. With malware becoming more sophisticated and capable of outsmarting traditional anti-virus technologies, business must prioritise cybersecurity and form an enterprise culture of digital awareness,

2017-06-06T16:52:54+00:00February 6th, 2017|

Unfair Contract Terms Protection Extended to Small Businesses

The unfair contract terms protections under the Australian Consumer Law was extended to protect small businesses from 12 November 2016.  In this blog, we will examine the far reaching implications of this change on operations of businesses, particularly for those businesses that rely on standard form contracts. To whom and what does the Act

2017-06-06T16:55:34+00:00January 20th, 2017|

Cloudy with a Chance of Rain: Best Practice Tips for Cloud Computing

Cloud computing has many benefits for business and government – it is cost-effective, easily accessible and scalable and infinitely customisable. However, the growth of cloud computing has also created new security challenges. An understanding of what the cloud actually is and how it works is crucial to understanding the security risks which it poses and how these risks can be managed.

2017-02-17T16:15:24+00:00August 3rd, 2016|