Security

Mobile devices: the next internet security target 

22 March, 2013 by Jonathan Andresen, Blue Coat Systems

Malnets are a lucrative source of income for distributors and they are becoming more sophisticated everyday. How can your business stay ahead of the distributors to protect your business?


The threat matrix

19 March, 2013 by Anthony Caruana

Security is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.


Cybersecurity challenges in 2013

08 March, 2013 by Sandeep Joshi, Country Manager for DELL SonicWALL Inc, Australia and New Zealand

The issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement.


Start preparing for Privacy Bill changes

05 March, 2013

Australian organisations should act now and start preparing for next year’s changes to privacy law, lest they breach the new rules and cop a huge fine.


Kaspersky Endpoint Security for Business

27 February, 2013 | Supplied by: Kaspersky Lab Australia & New Zealand Pty Ltd

Kaspersky Endpoint Security for Business (KESB) is intended to help businesses overcome challenges in managing a secure network.


Three IT problems you didn’t know you had

14 February, 2013 by Anthony Caruana

With so much change happening in enterprise IT with the proliferation of mobile devices, the introduction of BYOD and shifts towards cloud-based systems, there can be moments where the importance of security can take a back step in the name of expedience.


Antivirus shootout cuts scan time from three hours to three minutes

05 February, 2013 by Andrew Collins | Supplied by: Webroot Software, Inc.

The Royal Flying Doctor Service Western Operations (RFDSWO) has implemented a new antivirus system, cutting full system scan times from about three hours to under three minutes, and increasing the performance of endpoint machines.


Govt’s data retention plans “really bad”; Juniper routers at risk; China behind Twitter hack?

05 February, 2013 by Andrew Collins

In news this week: web legend Sir Tim Berners-Lee calls the Australian government’s data retention plans “really, really bad”; Juniper reveals a critical flaw in its routers; and the world speculates on who was behind the recent massive attack on Twitter.


Data security lessons from the Petraeus scandal

09 January, 2013 by Andrew Collins

The Petraeus scandal - the story of the resignation of the Director of the CIA following an investigation into harassing emails sent by his mistress - provides not just an insight into the lives of top spies, but also serves as a reminder that no one is exempt from digital privacy breaches.


Mobile browsers fail to meet W3C security standards

11 December, 2012 by Technology Decisions staff

Every one of the 10 major mobile browsers fails to meet security guidelines recommended by the World Wide Web Consortium (W3C) for browser safety, according to a study from the George Institute of Technology in America.


Web filtering considerations

04 December, 2012 by Andrew Collins

The stats say that employees burn a couple of hours a day on non-work websites like Facebook and Reddit. But there are technological and political issues you need to consider before implementing a web filtering solution.


Litéra Secure File Transfer

27 November, 2012 | Supplied by: ACP Solutions

Litéra Secure File Transfer provides email encryption, electronic signatures and secure large file transfer. It allows users to send encrypted emails and attachments of any file type up to 100 GB, and enables organisations to safely transfer large files that may otherwise be restricted by file size restrictions of the sender’s or recipient’s mail server.


Next-generation firewalls: security without compromising performance

06 November, 2012 by Sandeep Joshi - Country Manager for DELL SonicWALL, Australia and New Zealand | Supplied by: SonicWALL

IT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. Earlier-generation firewalls pose a serious security risk to organisations today as their technology has effectively become obsolete, failing to inspect the data payload of network packets circulated by today’s internet criminals. Next-generation firewalls (NGFWs) have emerged as the solution to this thorny problem.


Passwords can be harvested from PCs in standby mode

21 August, 2012

When a computer is switched off, any passwords you used to login to web pages, banks or other financial accounts evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.


Eleven tips for SMB information security

15 August, 2012 by Michael McKinnon, Security Advisor, AVG Australia and New Zealand

Small to medium-sized businesses (SMBs) are becoming the preferred target of cybercriminals, since they are less likely to have strong security in place. Michael McKinnon, Security Advisor, AVG Australia and New Zealand, provides some tips for SMBs looking to reduce their chances of being compromised by cybercriminals.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd