Posts

Secure Your Business From Data Breaches

Identity theft is increasing on a global scale, with financial information and client records considered foundational data for cyber criminals that indulge in this practice, whether for strict financial gain or use in fraudulent transactions. The normal practice is that harvested data is used to create other accounts (such as bank, email or other) or indeed continue using existing accounts but changing passwords to prevent legitimate access.

Small to medium enterprises obviously store both financial and health information and are prime targets for hackers. In August 2014. These criminals do not care about your business information but focus more on your personal details such as date of birth, address, etc., using them for services or credit applications.

Australia has had its fair share of data breaches. In 2012, ransomware (software that locks down a computer until a ‘ransom’ is paid using an untraceable digital currency such as Bitcoin) was used to compromise the operations of a Gold Coast medical centre.

Luckily, with a little knowledge and some forward planning, you can protect your medical practice from most of these data breaches. I say most, as even large enterprises are successfully breached by highly skilled hackers on occasion and few servers can continue operation if thousands of hackers launch a simultaneous attack.

Read more

How To Fix A Data Breach: Fast And For Good

The Australian Federal Government this week launched the annual Stay Smart Online Week. In conjunction they have released the Stay Smart Online Small Business Guide. Business owners can use this guide to ensure they are following safe online practices, and have sufficient security in place to protect sensitive data from a potential breach.

This comes at a time when businesses, organisations and government departments are increasingly being subject to data breaches on a regular basis. Yet in what is a growing concern, there appears to be little consensus about what entities should do once a breach is discovered.

Defining a data breach is an exercise in itself. At its core, it refers to an unauthorised access of information on a computer or network. Hacking is the most common example, however the guidelines below apply not just to data breaches but to instances of online bullying, defamation, threats and similar problems in the digital space.

So who should you call when you want to investigate a data breach? The straight answer is that it all depends on what you want to achieve.

Read more