Industry News

Mandatory Data Breach Notifications

31 Breach Notifications in first 3 Weeks of New Scheme

Published March 20, 2018
ARN reports that the Office of the Australian Information Commissioner (OAIC) has received 31 data breach notifications in just the first three weeks since Australia's Notifiable Data Breaches Scheme came into effect on February 22nd. This says a few things: Australian businesses are taking their data privacy obligations seriously.  The immediate steady stream of notifications […]
IT consulting company

How to Combat Typosquatting: Defensive Domain Registration Techniques That Protect Your Business

Published February 28, 2018
Website domain name fraud has been an issue for larger businesses for some time, and recent statistics show that many organisations go to great lengths to curb the threat. Proofpoint’s Q4 Quarterly Threat Report states an average defensive domain registration rate of 300 domains per business. Despite these significant numbers, Proofpoint have found that suspiciously […]
Hand holding magnifying glass over Facebook login page | Computer One

Fake Customer-Support Accounts on the Rise: How Your Business Can Maintain Consumer Trust

Published February 28, 2018
In an era where online business trust is more vital than ever before, cybercriminals are frequently creating fake customer support accounts to steal user credentials, typically as the first step in an attack to harvest bank accounts. Social media scams can be disastrous from a public relations perspective - if customers do not trust the […]
Credit card on keyboard with fishing hook | Computer One

Spear-Phishing Prevention: Five Steps to Thwart Online Scams

Published February 1, 2018
Spear-phishing isn’t going anywhere, and the malicious practice can pose a real threat on an organisational level. IT professionals should employ a multifaceted approach to phishing prevention, with thought given to education, infrastructure and social media practices. Follow these five steps to give your enterprise the best chance to defend all attacks. Check the Integrity […]
Hand holding phone emitting green binary code | Computer One

Government-Sponsored Mobile Malware Campaign Uncovered: Why You Need to Be Cautious with Mobile Downloads

Published January 29, 2018
A mobile-targeted cyber espionage campaign dubbed ‘Dark Caracal’ has been uncovered by the Electronic Frontier Foundation and security firm Lookout. The scheme has been in operation since at least January 2012, affecting users in over 21 countries. EFF and Lookout have uncovered the actors of the scheme, stating that the campaign has been operated from […]
Frustrated man biting tie and clawing air | Computer One

Are you ready for the Notifiable Data Breaches Scheme? How do you know for sure?

Published January 22, 2018
Are you ready for the Notifiable Data Breaches Scheme? How do you know for sure? In less than a month (22nd of February) the Notifiable Data Breaches Scheme will come into force in Australia and organisations subject to the Privacy Act will suddenly have to think a lot harder about how they store, access and […]
A locked padlock | Computer One

Is Your New Year’s Resolution to Improve Your IT Security? Here Are 6 IT Nightmares to Learn From in 2018

Published January 10, 2018
A new year’s resolution that should be on every company’s list is to improve IT security and make sure that your IT staff are as effective as possible. Recently, Gabriel Leperlier - Verizon’s head of European advisory services for the payments cards industry (PCI) - visited a press briefing in London, where he talked through […]
Pixelated character holding a pickaxe in a blocky landscape | Computer One

From Wired: a Dorm Room Minecraft Scam evolved into a botnet operation and almost broke the Internet

Published December 14, 2017
This article from Wired is well worth a read if you can spare 10-15 minutes. It gives good insight into the race to find the programmers that created the Mirai botnet in 2016 and what drove the three creators to build, refine and repurpose the infection they created, as well as how they tried to […]
Businessman holding a tablet with cloud and device icons overlay | Computer One

Is Your Organisation Capable of a Digital Transformation?

Published December 12, 2017
We read a great article by CIO the other day - it was about turning digital transformation into a practical reality. The piece got us thinking about practical considerations when it comes to digital transformation in businesses, and whether it is even feasible for certain businesses to make the digital transition. Read the article here. […]
Hand drawing a cloud migration diagram on paper with laptop and tablet nearby | Computer One

Confident Cloud Migration - Let Computer One Test WAN Architecture Before You Make a Decision

Published December 12, 2017
Many companies are seeking to undertake cloud migration using a managed services provider, but the WAN services they receive are not always of the quality promised. While the specifications listed by a carrier service may seem to fit your company on paper, the service standard in practice can often fall short of expectations. Latency issues, […]
1 10 11 12 13 14 20
The Computer One logo with blue background
6 time winner of the
Channel Futures MSP 501 Winner logo white | Computer One
Local Government Procurement Approved Contractor logo | Computer One
Q-Mark ISO 9001 certified logo | Computer OneQ-Mark ISO 27001 certified logo | Computer One
© 2026 Computer One Australia.
arrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram