PrivaBroadcast

Vulnerabilities in Fax Protocol

ATO claims to have received more than 115,000 faxed documents in 2017-18. According to ‘The Age’, and ‘the Sydney Morning Herald ‘, many small Australian companies in the healthcare, finance and legal sector still use fax on a daily basis. The vulnerabilities in the fax machine protocols haven’t been updated since the 1980s and such extensive use of fax printers in Australia pose a huge problem.

Vulnerabilities in Fax Protocol Read More »

Marriot Data Breach and What Should the Customers do to Protect Themselves

Marriot on Friday reported a data breach affecting the information of 500 million of its Starwood customers. The stolen information includes name, phone number, email addresses, passport number and in some cases credit card numbers and expiry dates. While the company is still taking measures to do damage control for the second-biggest breach in history (after Yahoo’s data breach), here is what consumers can do to protect themselves:

Marriot Data Breach and What Should the Customers do to Protect Themselves Read More »

ISACA COBIT framework

The importance of Information and Technology Governance cannot be overstated. With companies trying to maximise the value derived from IT assets while managing the associated risks, the need for a structured approach to designing and implementing enterprise governance for IT is key.

READ MORE …

ISACA COBIT framework Read More »

Daily Backups

One of the most overlooked ACSC Essential Eight strategies in mitigating cybersecurity incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed. But what are the steps and strategies involved in backing up your data?

Daily Backups Read More »

Scroll to Top