121-130 of 168 results
OAIC concludes investigation of Australian Red Cross data breach
OAIC concludes investigation of Australian Red Cross data breach where a one-off human error by a third party provider's employee led to a massive data breach that hit the Australian Red Cross Blood Service ...
How to create a cyber resilient supply chain
What do the Australian Department of Defence Target Verizon and the Australian Red Cross Blood Service have in common They all suffered massive data breaches linked to a failure in their supply chain These breaches are a good reminder that with so much attention directed at securing your ...
On the international stage: Australia and the EU launch cyber security plans
In recent weeks, both Australia and the EU have unveiled their plans to address cyber security in an era of growing concern and uncertainty. On 13 September 2017, President of the European Commission, Jean-Claude Juncker, outlined the Union's intentions to intensify their efforts regarding cyber sec ...
Unexpected risks of the IoT revolution: Cyber security in medical devices
In late August 2017 the US Food and Drug Administration recalled 465000 Abbott Laboratories pacemakers due to cyber security vulnerabilities Although this was the first time that the FDA had recalled a medical device because of cyber concerns they have been alive to the significant risk that a cyber ...
Using third party brands in video games: issues and opportunities
One of the emerging battlegrounds for brand owners is video games, particularly with the growth of virtual reality applications. A recent claim made in the US illustrates how having your brand featured in a video game can be a problem - but depending on the circumstances, it could also present a com ...
What you need to know about mandatory data breach notification
In response to the rising number of cyberattacks, new legislation has been introduced that proposes a mandatory notification regime that will take effect from February next year. ...
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
ASIC Corporate Plan puts cyber resilience high on the agenda
ASIC's latest Corporate Plan has put cyber resilience high on the agenda ...
New EU rules raise the bar for data security
The EU General Data Protection Regulation GDPR which will apply from May 2018 includes enhanced data security requirements and obligations to notify regulators and individuals of data breaches A failure to comply with key provisions may lead to a fine of up to euro20 million or 4 per cent of global ...
Ambush marketing: traders beware!
Everyone knows the famous adage that 'the enemy of my enemy is my friend'. But can the friend of my friend be my enemy? In the context of ambush marketing, the answer can be yes. ...


