feature image

Digital Pulse

in·no·va·tion – A creation resulting from study and/or experimentation. The act of starting something new.

dis·rup·tion – An act of delaying or interrupting continuity. An event that results in displacement or discontinuity. The act of causing disorder.

Digital change is a journey, not a destination.
It requires agility and flexibility to underpin a continually evolving business environment.

Industry Change – The ongoing economic, technological and social development of commercial business and market sectors.

All posts tagged cyber security

password security

Infographic: The psychology behind poor passwords

As the main access keys to our digital lives, secure passwords are a must. A study into the psychology of why we choose the passwords we do, reveals that these lessons perhaps aren’t being taken to heart.

Read More...

Government strategy on cyber security: Businesses must unite

The federal government’s new Cyber Security Strategy is here. Is it a step in the right direction, and what does it mean for Australian businesses?

Read More...

Putting your incident response plan into action

You’ve defined your risk profile, prepared a plan and rehearsed your team in case of a cyber security breach. Today, it’s happened. How best to enact your incident response plan?

Read More...

Are you prepared for a cyber attack?

Over a third of organisations think they’ll be affected by cyber crime in the next two years. If your company falls victim, what exactly will you do? From handling the press to notifying the regulators, Andrew Gordon walks us through an incident response plan.

Read More...

Infographic: Password security

123456 is easy to remember? It’s a breeze to hack, too. Despite increased awareness of the dangers of security breaches, passwords are still being treated too flippantly.

Read More...
Selfie for biometrics

Do ‘selfies’ spell the end of passwords?

Payment providers are rolling out the next generation in online security, using technology including voice recognition, photographs and iris scanning. Tied to our unique physical characteristics, biometrics presents an opportunity for infallible authentication – or does it?

Read More...

The trouble with wearables: Security and implementation

Prepare for deployment, the wearables revolution is here! But wait – what’s the security impact of connecting staff to monitoring devices? Andrew Gordon addresses the concerns.

Read More...

Infographic: Overcoming hazards in connected healthcare

In the race to develop connected healthcare devices, the depth of adequate security can vary wildly. This infographic looks at the how plugging medical devices into the internet of things can pose a threat to patients, sales and reputation.

Read More...
Operational technology

First they came for our data, now they come for our infrastructure

Since an Iranian nuclear facility was famously hacked in 2009, essential infrastructure has increasingly been the target of malicious attacks. Duncan Alderson explains why the cyber security of operational technology is a growing concern.

Read More...

How the cyber security boom is driving growth

A growing awareness of online threats has seen businesses invest in their cyber capabilities to turn present-day risks into future opportunities, explains Ganesha Rajanaidu.

Read More...