Government enacts improved cybercrime legislation
As an increasing number business and government activities occur online, the Federal Government has introduced new legislation to boost online identity and data security.
As an increasing number business and government activities occur online, the Federal Government has introduced new legislation to boost online identity and data security.
Data breaches are becoming a major concern for businesses, with a recent survey by Check Point Technologies and Ponemon Institute finding 77 percent of organisations have experienced data loss in the last 12 months.
Website filtering, as part of a greater online security plan, is one step businesses can take to boost staff productivity, according to security software firm Veritech Corporation.
Last weekend, there was another Twitter security breach — a phishing attack. As the Twitter micro blogging service comes into its fourth year of existence, it is more popular than ever, especially for businesses, which makes it a perfect target for cyber criminals. The nature of Twitter has always meant to be very open, so […]
With more and more staff using social network sites like Facebook, Twitter and MySpace from work, plenty of businesses are asking the question, “If social networks are such a risk, shouldn’t we just block them?” When social networking web sites such as Facebook and MySpace first emerged, some businesses viewed them as a distraction from […]
Adding a secure online payment system can be complicated, but ensuring customers trust their money is safely transmitted is just as important as the technical consideration. Angus Kidman looks at how to achieve the twin goals of functionality and security online. Jace Lai has more than 30 years’ experience in managing payment systems, but when […]
Malware and cyber attacks continue to plague enterprise networks. Meeting business security challenges is a priority for all organisations. Here’s how you can install cost-effective security for your business. By Bryan Stibbard Granting web access to employees poses new challenges to IT administrators. In addition to regulatory imposts, hackers and data thieves are developing new […]
You have reached the end!