If your teams can’t tell you much about their privacy and IT security obligations, the answer is no. Privacy and security obligations involve considerably more than just knowing what phishing is.
You can install all the technology you want to protect you from a cyber attack but, if you don’t motivate and utilise your greatest asset…
Much has been said about Australia’s vulnerability to a cyber-attack. Since COVID, and the move to a working from home model, that vulnerability has increased.
For some time, the discussion about whether there’s a shortage of cyber security professionals has been debated, but either way, who wants to lose effective and skilled IT staff?
After the deaths of four people on a theme park ride, Ardent Leisure has been charged under the Work Health and Safety Act (Qld)
This important report concerning the hack on the ANU’s systems was released publicly last week by Brian Schmidt, Vice-Chancellor.
The answer is to embed your ICT Security Policy.
Although the term “lessons learned” is commonly heard now, many organisations, certainly in Australia, do not actually utilise this valuable opportunity for risk management.
ICT leaders can demonstrate the value of ICT by informing other executives within their organisations of the risks and success stories associated with projects and, by promoting learning for the governance function.