News

 

FRAMEWORKS- HOW TO BUILD ONE?

I am often asked what information security framework I use. Well, there are plenty to choose from. Many of them are excellent and some are even useful. New frameworks are developed quite often. Some are simply rebadging an old one, calling it “cyber”. Others have plenty of thought put into it and are quite valuable.

Read more here.

 

ESSENTIAL EIGHT

A non-vendor specific guide, the Australian Signals Directorate's (ASD) Strategies to Mitigate Cyber Security Incidents is a prioritised list of practical actions organisations can take to make their computers more secure.
The advantage of this guidance is that it is customisable to each organisation based on their risk profile and the threats they are most concerned about.

Read more here.


GDPR (General Data Protection Regulation)

Elizabeth Denham, the information commissioner in charge of data protection enforcement, says she is frustrated by the amount of "scaremongering" around the potential impact of the GDPR for businesses.
We agree. Here instead is the OAIC's guide to "Australian businesses and the EU General Data Protection Regulation" and if you have any questions, come and ask us.