Business Continuity — News
Dr Lizzie Coles-Kemp is a senior lecturer in the Information Security Group, Royal Holloway University of London. She is keenly interested in how social behaviours influence our attitudes to security. For example, in communities where Internet accounts need to be shared between family members, the security professional's assumption that one account and password identifies one person is undermined. CSO spoke to Dr Coles-Kemp about the nexus between social behaviours and information security.
Australia’s Internet space shows the same distribution of vulnerable IP ports as the rest of the world and a dangerous preponderance of insecure Universal Plug ‘n’ Play (UPnP) devices, Metasploit Project founder HD Moore has warned while recounting the surprising results of his efforts to catalogue the results of communicating with every IP address on the Internet.
After being announced in the US earlier this year, Symantec’s Backup Exec 3600 makes its way down to Australia.
Workers have been agitating for bring-your-own-device (BYOD) strategies for some time now, but a new survey suggests many are actually concerned that BYOD – which has already raised security issues and is forcing companies to invest in sophisticated analytics – is giving management an excuse to snoop on their information.
Reports were questioning corporate security culture as KPMG suggested a lack of legislation around mandatory data breach notifications has left many Australian companies tight-lipped on the subject.
By implementing a national multi-factor authentication system Australian citizens will benefit from having the highest levels of online security in the world. This technology may provide a significant competitive advantage to business in securing digital assets and could lead to innovation based export opportunities. The headlines report massive breaches of information that directly expose our financial systems to grave risk. Australia must set the benchmark in secure digital vigilance to safeguard our information security perimeter from existing and potential threats.
When it comes to protecting enterprise data, CIOs and CSOs are at a crossroads. The complexity and prevalence of security threats continue to grow, bolstered by consumer IT and mobility. The open nature of IT has paved the way for far more sophisticated attacks—beyond conventional credit card data theft to multilevel attacks. Information security executives face perhaps the toughest challenge of their careers.
It's high time for enterprises to stop viewing backup and business continuity as separate from their security environment, according to Telsyte analyst and former journalist Rodney Gedda.
Today's sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.
A key part of any information security strategy is disposing of data once it's no longer needed. Failure to do so can lead to serious breaches of data-protection and privacy policies, compliance problems and added costs.
Symantec on Monday unveiled new versions of its flagship NetBackup enterprise-class and Backup Exec midrange backup applications -- Backup Exec 2012 and NetBackup v7.5.
Although security issues are often top of mind for many organisations, they are often not considered as part of a disaster recovery (DR) plan.
"It will take a massive incident for our company to wake up to itself!" How often do you hear that in the information security industry? All the time -- so what generally happens when things go horribly wrong after the "incident" occurs?
I got most of what I asked for, and I got it early. Sounds good, right? Not so much.
Let's call a spade a spade: China is the greatest threat to international cybersecurity on the planet.
USB sticks remain a big security weakness for many UK organisations with many employees using drives for data transport without permission and not bothering to report their loss, a Ponemon Institute study has found.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.