Daily Bulletin

Men's Weekly

.

  • Written by Jenni Henderson, Assistant Editor, Business and Economy, The Conversation

The first thing business gets wrong in understanding cybersecurity is assessing the value of the information it holds.

Businesses need to know the information they are trying to protect. Is it information about the business that would be shared via marketing? Information that is commercial in confidence? Or does it have a high security risk, such as defence information, intellectual property for a new drug or customer’s financial information?

It’s important to know the difference, says Craig Horne, chairman of the Australian Computer Society in Victoria, who is also completing his PhD in information security strategy in organisations.

Another aspect to cybersecurity is having the right people, hardware and software to manage risks. Companies could be doing better by sharing information on known threats and employing people with real world skills, rather than just “STEM” (science, technology, engineering and maths) graduates, to tackle future risks.

Authors: Jenni Henderson, Assistant Editor, Business and Economy, The Conversation

Read more http://theconversation.com/business-briefing-hack-proof-how-business-can-stay-ahead-in-cybersecurity-64593

Business News

How HZad Education Supports International Students Preparing for CELPIP in Australia

As Australia officially accepts CELPIP (Canadian English Language Proficiency Index Program) for visa applications, international students face new opportunities alongside unprecedented preparation ch...

Daily Bulletin - avatar Daily Bulletin

Online Site Inductions for Busy HR Teams

Induct For Work, the Australian platform for frontline onboarding and compliance, has launched Compliance Hub, a fully integrated, real-time workflow designed specifically for the fast-paced, highly m...

Daily Bulletin - avatar Daily Bulletin

Reporting Tools in Cybersecurity and Penetration Testing

Reporting is a critical part of every penetration testing engagement. After vulnerabilities have been identified and verified, the findings must be documented clearly and systematically to inform deve...

Daily Bulletin - avatar Daily Bulletin

LayBy Deals