161-170 of 239 results
Ransomware: The year in review
Ransomware is big business as cyber criminals increasingly transition from a business model focused on the theft of data to one predicated on extortion Remarkably however the use of malicious software to elicit a financial benefit is not new with the first recorded outbreak of ransomware occurring ...
Unexpected risks of the IoT revolution: Cyber security in medical devices
In late August 2017 the US Food and Drug Administration recalled 465000 Abbott Laboratories pacemakers due to cyber security vulnerabilities Although this was the first time that the FDA had recalled a medical device because of cyber concerns they have been alive to the significant risk that a cyber ...
Your data breach response plan should...
Your data breach response plan should ...
Your guide to notifying an eligible data breach
Your guide to notifying an eligible data breach ...
Clarification on the meaning of 'personal information'
The AAT has overturned the Grubb determination of the Commonwealth Privacy Commissioner and found that mobile network data from an individual's phone activity does not constitute 'personal information' under the Privacy Act ...
Landmark Productivity Commission report on data availability and use
The Productivity Commission has released a landmark draft report on the ability of individuals businesses and government to access and use data in Australia The report criticises Australias historically conservative approach to data use and proposes a fundamental and systematic change to the way ...
OAIC concludes investigation of Australian Red Cross data breach
OAIC concludes investigation of Australian Red Cross data breach where a one-off human error by a third party provider's employee led to a massive data breach that hit the Australian Red Cross Blood Service ...
Final APRA Guidance on Information Security (CPG 234) released – are you prepared?
APRA has released the updated final version of its Prudential Practice Guide, which gives crucial context about how it views cybersecurity threats. ...
ASIC's proposed market integrity rules for technological and operational resilience could impose far-reaching obligations
The COAG Energy Council Hydrogen Working Group continues its work on the National Hydrogen Strategy, with the release of its issues papers series. The nine papers are a fascinating look at the breadth, depth and interwoven nature of the issues facing hydrogen. ...
Trend Watch: What the top ten 2018 cybersecurity trends mean for your business
Last year was a big year for cybersecurity Organisations were forced to grapple with an increasingly complex regulatory environment as governments across the globe continued to navigate how to best protect personal information in the face of increasingly sophisticated cybersecurity threats We look ...


