All about the new Cyber Security Legislative Package 2024
Security Centric Blog
by Security Centric GRC
1M ago
The Australian Government has introduced sweeping changes to strengthen the national cyber security posture through a landmark Cyber Security Legislation Package, enacted on the 25th of November. These reforms aim to protect critical infrastructure, enhance collaboration between businesses and government, and improve incident response ..read more
Visit website
Microsoft 365 Breaches - As preventable as they are common
Security Centric Blog
by
8M ago
The Problem It seems like every other day there is a public announcement of a compromise involving unauthorised access to Microsoft 365. Privately, we are called in more often than we would like to deconstruct a compromise and determine if a notifiable data breach has occurred. As organisations move to adopt more and more features, tools and products of M365, more data is finding its way into the platform, becoming the defacto centralised repository for all types of commercial, sensitive, personal and confidential information. Due to the frequency and commonality of these Microsoft 365 breach ..read more
Visit website
Cyber Security - Year In Review 2023
Security Centric Blog
by Alex W
1y ago
The statistics provided in the Australian Signals Directorate Cyber Threat Report paint a bleak picture of the cybersecurity landscape in Australia with the average cost of an incident and the frequency of incidents rising.​ Here are some added insights from the Security Centric team ..read more
Visit website
$2k to avoid being another Optus
Security Centric Blog
by Security Centric
2y ago
The Optus PII breach has been the subject of many conversations the past week or so - at the technical level all the way through to advising boards on what is relevant to their organisation vs what is jumping on the topical news bandwagon.  A common thread has been repeated so many times that I thought I would share the insights. Based on knowledge to hand, reading between the carefully curated PR speak, is the breach could have been prevented for under a couple of thousand per month. Let me explain ..read more
Visit website
In Brief: Cyber updates to the Critical Infrastructure Bill
Security Centric Blog
by Jill T
2y ago
After a lengthy traverse through the various stages of parliament, the final updates to the Security Legislation Amendment of the Critical Infrastructure Protection Act (SLACIP) passed at the end of March, 2022. This Act forms the final part of amendments made to the Security of Critical Infrastructure Act 2018 (SOCI).  ..read more
Visit website
Report: The 2022 State of Email Security
Security Centric Blog
by Jill T
2y ago
It's that time of year when the team over at Mimecast releases their much-anticipated State of Email Security report. Covering data that spans the entirety of 2021, the report surveyed 1400 IT decision makers on everything from email-based threats to cybersecurity budgets ..read more
Visit website
Threat Advisory: Okta Compromise
Security Centric Blog
by Security Centric
2y ago
News came to light recently from a threat actor group that authentication provider Okta had been compromised by one of their members.  ..read more
Visit website
How the ACSC Essential Eight can protect against supply chain attacks
Security Centric Blog
by Alex W
2y ago
As security teams assess the key vulnerabilities of their IT infrastructures, growing attention is being placed on cyber supply chains ..read more
Visit website
Security Centric Appoints Former Trend Micro Lead Sameh Girgis
Security Centric Blog
by Security Centric
2y ago
Security Centric has announced the appointment of Sameh Girgis as Senior Security Consultant ..read more
Visit website
Updates to the ISO 27001 certification standard: What you need to know
Security Centric Blog
by Jill T
2y ago
If you're not yet familiar with the ISO 27001 standard, it's an internationally recognised certification standard specifically focused on information security. Using the policies and procedures outlined in the standard enables an organisation to implement an information security management system (ISMS) to better protect their information in a systematic way.  ..read more
Visit website

Follow Security Centric Blog on FeedSpot

Continue with Google
Continue with Apple
OR