Loading...

Medical Records Trust & Transparency

Download Article Data use and an individual’s rights have become very topical with the increasing number of data breaches that impact us as individuals, including reports on data issues in the health sector. Take the Facebook/Cambridge Analytica problems as an example. The Facebook–Cambridge Analytica data scandal was a major political

2018-11-19T12:55:55+00:00November 19th, 2018|

My Health Record

The deadline for opting-out of My Health Record is fast approaching. If you don't already have a My Health Record, and do not want one created for you, you will need to opt-out by 15 November 2018. You can do this online. You will need to have you Medicare card and driver licence (or other form

2018-11-14T11:47:47+00:00November 14th, 2018|

The First Line of Defence Against Cyber Criminals

In this blog, we discuss the importance of organisational culture to cyber resilience and security. While technical safeguards are important, the rise of social engineering as a method of breaching an organisation’s security means that technical solutions alone are likely to be ineffective.  Consequently, employees are often your organisation’s first line of defence to

2017-12-14T12:19:34+00:00September 11th, 2017|

Techniques for Cyber Testing your Technology Infrastructure

It’s no secret that constantly evolving security threats pose dangers to your organisation, but you may not be aware of the high rate of occurrence of cyber attacks and the likelihood that your organisation’s ‘secure’ network system may be targeted next. A recent report by Rapid7, an IT security company, found that two thirds

2017-06-06T17:27:54+00:00June 6th, 2017|

ASD’s Essential Eight to Mitigate Cyber Security Incidents

In February 2017, the Australian Signals Directorate (ASD) expanded its Top Four cyber threat mitigation measures to the “Essential Eight”. What are the measures, what has changed, what is new and what do they all mean? The Australian Signals Directorate The ASD is responsible for providing cyber security guidance and setting policies for all

2017-05-16T13:08:39+00:00May 16th, 2017|