In our previous insight, we discussed the Notifiable Data Breaches Scheme (NBD) which was established by the Office of the Australian Information Commissioner (OIAC) in 2018. Although complying with the scheme can be complicated, it is important you understand your obligations under the NBD. If you fail to report a data breach, the OAIC may
In this blog, we discuss the importance of organisational culture to cyber resilience and security. While technical safeguards are important, the rise of social engineering as a method of breaching an organisation’s security means that technical solutions alone are likely to be ineffective. Consequently, employees are often your organisation’s first line of defence to
It’s no secret that constantly evolving security threats pose dangers to your organisation, but you may not be aware of the high rate of occurrence of cyber attacks and the likelihood that your organisation’s ‘secure’ network system may be targeted next. A recent report by Rapid7, an IT security company, found that two thirds
Cloud computing has many benefits for business and government – it is cost-effective, easily accessible and scalable and infinitely customisable. However, the growth of cloud computing has also created new security challenges. An understanding of what the cloud actually is and how it works is crucial to understanding the security risks which it poses and how these risks can be managed.
The Australian Government released its Australian Cyber Security Strategy (“Strategy”) on 21 April 2016. In our last cyber security blog (2/3), we provided our analysis on the Strategy. It is clear that the Strategy places an emphasis on the cooperation of the private sector being central to effectively dealing with cyber threats. In our first