Accidental deletion top cause of email recovery
06 August, 2014 by Dylan Bushell-EmblingRecovering accidentally deleted messages and collecting data for investigations or e-discovery are the most common uses for email data-recovery software, a survey suggests.
Deakin watermark tech could tackle music piracy
16 July, 2014 by Dylan Bushell-EmblingDeakin University scientists have developed a new digital watermarking method which they claim could potentially stamp out music piracy.
Australian IT companies should prepare for global internet failure
30 June, 2014Implementing preventive cybercrime measures can be compared to the hopelessness of forever stacking sandbags to protect against a severe hurricane, says a report by Zurich.
Heartbleed points to bigger SSL problems
17 June, 2014The Heartbleed vulnerability was just the tip of the iceberg, says a Palo Alto Networks report which reveals that 32% of applications are capable of using SSL.
Business security risks from e-commerce on the rise
11 June, 2014The growth in mobile e-commerce will leave businesses critically exposed to data breaches unless they ramp up their IT security, says consulting firm Protiviti.
SaaS security: you're doing it wrong
06 May, 2014 by Andrew CollinsYour approach to securing software-as-a-service (SaaS) is wrong. But don't worry - it's not entirely your fault.
McAfee launches Heartbleed checker tool
14 April, 2014 by Dylan Bushell-EmblingMcAfee has launched an online tool to help consumers check whether the websites they visit are vulnerable to the Heartbleed exploit, to determine whether it is safe to change their passwords.
Businesses lose data despite backing up
28 March, 2014 by Dylan Bushell-EmblingA survey shows Australian consumers and businesses who have lost data were in fact using a backup system at the time of their data loss.
Three security tips for iOS in the enterprise
27 March, 2014 by Andrew CollinsApple's iOS is the most commonly used mobile OS in enterprises in mature markets, according to analyst firm Gartner. IT managers have a series of decisions to make about managing iOS devices, in order to minimise the risk of data leakage.
Aussie firms unprepared for Privacy Act changes
05 March, 2014 by Dylan Bushell-EmblingNew changes to Australia's Privacy Act which come into effect this month could catch up to three in five Australian organisations unprepared, and leave them liable to penalties.
Security pros slam LinkedIn mobile app
31 October, 2013 by Dylan Bushell-EmblingLinkedIn's new Intro app, designed to insert profile data from the social network into users' emails on iOS devices, has been called "a dream for attackers" by security experts.
Voice biometrics in the finance industry
17 September, 2013 by Brett Feldon*Voice biometrics contact centre technology provides a way for banks and financial institutions to improve security and customer engagement.
Third-party breaches
01 May, 2013 by Marc Bown, Managing Consultant, Trustwave Spiderlabs, APACMany companies use partners to support their core business needs. Do those partnerships leave you and your data vulnerable to attacks?
Three IT problems you didn’t know you had
14 February, 2013 by Anthony CaruanaWith so much change happening in enterprise IT with the proliferation of mobile devices, the introduction of BYOD and shifts towards cloud-based systems, there can be moments where the importance of security can take a back step in the name of expedience.
Kyocera Net Policy Manager secure printing program
02 August, 2012The Kyocera Net Policy Manager (KNPM) is an economical and simple way for organisations to reduce document costs, introduce secure printing and adopt a sustainable printing strategy.