Blog

Security

The Power of One – ASD Top 4 in a Box

When it comes to ASD top 4 compliance, most organizations think it’s easier to put off the pain. The reality is investing in top 4 compliance is far more cost effective than the alternative, dealing with a breach. During an audit of three federal government agencies in 2018, it was highlighted that…

Read more...

Are You Ready for the New WannaCry? You Better Be!

After the carnage and financial damage caused by WannaCry in 2017, here we go again. Yesterday Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, identified and reported to Microsoft by the UK’s National Cyber Security Centre. This vulnerability is wormable,…

Read more...

Managing Your IT Security With One Multi-Layered Approach

As the prevalence of directed cyber-attacks increase at an exponential rate, it has never been more important to monitor your IT security defences, effectiveness and policies in real time. How to go about it though when different areas of defence are controlled by different applications and differen…

Read more...

How Does Your ASD Maturity Compare to the Market?

As we come to the end of our annual ANZ Interchange unplugged conferences, a big thank you to all the customers and partners who took the time to come listen and interact with us. We were lucky to have most of our senior executive team here including Steve Daly our CEO, Steve Morton our CMO, Tom Da…

Read more...

My Health Records System: Opt-in or Opt-out?

According to the Australian Government, My Health Record is an electronic summary of a person’s health information. Healthcare providers are able to add information about a consumer's health to their My Health Record, in accordance with the consumer’s access controls. This may include information su…

Read more...

GDPR and What Solution Can Help

Introducing GDPR The General Data Protection Regulation (GDPR) came into force on May 25, 2018. It requires that organizations doing business with, employing, or collecting or processing EU citizens' personally identifiable information (PII) protect it. Make no mistake: While the GDPR is technical…

Read more...

Spectre and Meltdown: 3 Things You Can Do to Speed Back Up

I’m sure we’ve all seen the articles around Spectre and Meltdown this year: fixes aplenty, and in some cases side effects of slower performance and more resource usage. These slowdowns make sense of course, because the attacks take advantage of the speculative execution feature in processors that ma…

Read more...