Are you ready for the new PCI standards?
08 September, 2015 by Chris Williams, CEO, Securus Global | Supplied by: Securus Global
Fines of up to $500,000 can be levied on any merchant or service provider that is compromised and not compliant with Payment Card Industry (PCI) standards at the time of an incident.
Protecting yourself against CryptoLocker
02 September, 2015 by David Higgins, ANZ Country Manager, WatchGuard Technologies | Supplied by: WatchGuard Technologies IncCryptoLocker has been one of the biggest crises in IT over the past 18 months, and it hasn't gone away. Here are eight steps you can take to prevent an attack.
Security awareness campaigns could save your business
31 August, 2015 by Andrew CollinsEducating people about security and making sure that those ideas stick is an involved process that will differ by industry, company and roles, and how staff interact with IT.
Unmanaged Apple devices expose companies to big risk
28 August, 2015 by Dylan Bushell-EmblingWith Apple devices widely used within the enterprise, poor device management and security processes for the devices are exposing companies to huge liabilities, according to Centrify.
Fortinet FortiAP-S WLAN AP solutions
25 August, 2015 | Supplied by: Fortinet Australia Pty LtdThe Fortinet FortiAP-S series access points (APs) provide organisations with a cost-effective, easy-to-manage and secure option for deploying secure Wi-Fi without compromising security when opting to manage their enterprise WLAN from the cloud.
Australia now a top 10 source of DDoS attack traffic
20 August, 2015 by Dylan Bushell-EmblingAustralia had the dubious honour of joining the top 10 list of sources of global DDoS attack traffic during the second quarter, marking the first time it has been included.
Kaspersky allegedly sabotaged rivals; Salesforce plugs security flaw; Lenovo laptops' dodgy firmware
20 August, 2015 by Andrew CollinsKaspersky Labs denies reports it tried to damage rivals, Salesforce patches takeover vulnerability and Lenovo stops shipping exploitable laptops.
Cybercrooks targeting Australia get more inventive
20 August, 2015 by Dylan Bushell-EmblingWhile the number of malicious URLs clicked by Australians fell significantly during Q2, attackers turned to more creative ways of using existing exploits such as macros and exploit kits.
Palo Alto Networks PA-7080 firewall
19 August, 2015 | Supplied by: Palo Alto NetworksThe Palo Alto Networks PA-7080 next-generation firewall provides power, intelligent scalability and management simplicity that is suitable for large enterprise and service provider environments.
Security round-up: Symantec to sell Veritas
12 August, 2015 by Dylan Bushell-EmblingSymantec has announced a US$8bn deal to sell its Veritas unit, while Oracle and the UK's Export Control Organisation have come under fire from the security community.
Aussie businesses still using pirated software
05 August, 2015 by Dylan Bushell-EmblingBSA | The Software Alliance has settled seven cases involving use of pirated software by Australian businesses this year so far, raking in a total of $147,000.
Nearly all Android phones, smartwatches at risk of attack
05 August, 2015 by Dylan Bushell-EmblingResearchers have discovered a serious vulnerability that could affect up to 95% of Android devices in use, while HP Fortify has tested 10 smartwatches and found them all to have vulnerabilities of their own.
Cisco calls on govt to make Aust the safest place online
04 August, 2015 by Dylan Bushell-EmblingCisco has prepared a detailed response to the Australian Government Cyber Security Review, suggesting wide-ranging reforms including ensuring that the new ACSC has a greater influence on the states.
Aussie security pros support legal sanctions for data loss
04 August, 2015 by Dylan Bushell-EmblingNearly all Australian security professionals believe that there should be legal penalties for companies inadequately safeguarding customer data, a survey shows, with some even supporting jailing the CEO.
Identity theft — are you a prime target?
30 July, 2015 by Matt Miller, Director, ANZ, F5 Networks | Supplied by: F5 Networks IncBusinesses must realise that the cost of data breach-led identify theft far exceeds the expenses required for complete security protection, said Matt Miller, Director, ANZ, F5 Networks.
