Higher education institutions find themselves targets of cybersecurity threats at an alarming rate. Higher education IT departments must respond to the ever growing number of cyber threats that their students, staff and systems encounter. They must safeguard a large number … Read More
Data Breaches And Identity Theft: How It Happens
An article published by the ABC has highlighted the dangers of data breaches and identity theft, including how they occur and the consequences. It shows how a person’s full identity and information can be pieced together by cybercriminals, and the dangers of … Read More
Society is abuzz with the emergence of AI technology, and tools like ChatGPT and Bard have generated significant excitement. Developers are in a race to introduce advanced features to their applications that can automate tasks for consumers, and these features range from composing emails to … Read More
The advanced nature of cybersecurity means that criminals now have many points of access. These now include previously unthought of items such as children’s toys and even our garbage. Many common items can lead to information or identity theft but … Read More
The number of applications and digital tools that employees use on a regular basis is growing, with some departments utilising between 40 and 60 different digital tools to carry out their tasks. Many apps generate alerts and notifications, such as … Read More
AI chatbots, such as ChatGPT, are frequently in the headlines, and they certainly provide a lot of useful capabilities for their users; though as with many new online technologies, there will be those who use them to exploit and cause … Read More
The need to back up data has been a requirement since the invention of the computer. Data losses can occur for a variety of reasons, including hard drive and system crashes, security breaches and virus infections, and unfortunately most of … Read More
On the 27th of February, the Australian government convened a cybersecurity roundtable to make Australia the most cyber-secure country by 2030. Members from the public service, and intelligence agencies, along with experts from business and industry, were in attendance to … Read More
Vulnerabilities in technology are an unfortunate side effect of innovation. For example, when software companies release an update, it can contain weaknesses in the code, which hackers can use to exploit. Once this is realised the vulnerabilities are addressed with … Read More
No business wants to incur a cyberattack or data breach, but in the current online environment, it can be difficult to avoid them completely. According to an IBM Security report 83% of businesses have experienced at least one data breach. … Read More