Cybercrime is big business - are you safe? Cybercriminals target businesses of all sizes, stealing information to commit identity theft, fraud and other crimes. The consequences of this can be devastating. Stay Smart Online Week 2019 is focusing on empowering businesses to take simple steps to...

Massive data breach hits Australia A third party IT contractor breach has exposed 50,000 Australian personal records including full names, passwords, IDs, phone numbers, and email addresses as well as some credit card numbers and details on staff salaries and expenses. Human error is again the...

Mandatory Data Breach Notifications and Your Business The Federal Government has recently passed the Bill which will make mandatory data breach notifications a legal obligation for organisations with responsibilities under the Privacy Act. Organisations that may comply with the legislation included businesses with over $3 million in turnover and...

AND…WE’RE OFF! DATA BREACH NOTIFICATION BECOMES AUSTRALIAN LAW The Federal Government has recently passed the Bill which will make mandatory data breach notifications a legal obligation for organisations with responsibilities under the Privacy Act. Organisations that may comply with the legislation included businesses with over $3 million in turnover...

Worst Passwords of 2015 Since 2011, SplashData has published a list of the most commonly used passwords compiled from analysing password breaches during that year. The result is known as the "Worst Password List", which highlights common passwords that potentially put people and businesses at risk of a...

Mandatory Data Breach Notifications The Government has released draft legislation that will introduce mandatory data breach notifications in 2016. The legislation aims to make it compulsory for organisations regulated by the Privacy Act, to notify regulators and affected individuals, if there are reasonable grounds to believe...

Primary Sources of Data Breaches Ponemon Institute conducts independent research on privacy, data protection and information security policy. Results from Ponemon’s “2015 Cost of Data Breach Study: Australia” classified data breaches into three primary sources…   Malicious or criminal cyber attacks Not only are malicious attacks the most widespread...

Companies warned of internal cyber risk A global leader in risk consultancy has warned companies of the dangers of internal cyber risk. While many assume that cyber risk falls under an external threat from outside hackers, Control Risks have warned that danger can lurk within any organisation. Jason...