Cyber crime and cyber attacks are immediate threats to organisations of any size. Managing it is now a C-suite priority, as businesses grow increasingly aware of the damage breaches can have on both their ROI and their reputation (for example, the recent British Airways data breach crisis). Businesses recognise how vital it is to guarantee an..
SIEM, or security information and event management software, is a product you can’t afford to ignore if you’re serious about maintaining robust cyber security. Far more than a simple incident logging program, this management software aggregates data and highlights activity which is unlike typical system processing. SIEM is intelligent and proactive, and provides businesses with..
In an increasingly connected age, you don’t need to chain your company workforce to the office. Now that wireless communication is commonplace, and the demand for remote working is on the rise, we’re in a mobile corporate world. From cloud-based programs to portable devices, businesses have shifted away from a traditionally rigid office model–and they..
Database security, and data protection, are stringently regulated. Although the law struggles to keep up with the constant changes of an evolving digital world, there are regulations in force which demand certain standards from any business with an online component. Users across the globe expect their privacy to be taken seriously and modern commerce must..
In the modern digital world, simply going online can expose us to a number of harmful cyber threats. Whether we’re inputting credit card data or confirming our identity, we’re often at risk of intrusion. Similarly, mobile apps developed without robust security in mind risk exposing users to vulnerabilities which can cause varying levels of damage…
Brisbane City Council selects specialist security & managed provider Global Asset Systems for both 3 year SIEM & Managed Security Service contracts Brisbane City Council awarded the significant multi-year contracts naming the GA Systems (Global Asset Systems) as its preferred tenderer after the lengthy evaluation of multiple submissions. As a core element of the Council’s..