Since its inception in February 2018, the Notifiable Data Breaches scheme (NDB scheme) in Australia has delivered some very interesting results, which we can all learn from. The NDB is a legal requirement imposed by the OAIC (Office of the Australian Information Commissioner) on organizations of all sizes to notify individuals of eligible data breaches. In her 12 … [Read more...]
Securing The API Economy
If you are a business owner (CEO, CIO, or head of a business line) you continuously need to look for ways to innovate, out-think and out-maneuver your competition. In the sharing and collaborative economy we live in, you have an unprecedented opportunity to team up with others to make what you’re good at even better, even more compelling, or part of a larger value proposition. … [Read more...]
Intellectual Property Theft – Are YOU at risk ?
IP theft in midsized businesses – Are YOU at risk? I’d like to focus on an important topic, which is especially relevant for midsized corporates, SMBs and distributed enterprises: Intellectual Property (IP) theft. BIG business for cyber criminals. When my Team and I meet clients who are midsize, SMBs, or distributed enterprises, many do not see IP theft as a threat. “It … [Read more...]
Sharing your business destinations to the world on LinkedIn? Beware
Social engineering is an increasingly important methodology used by fraud actors of all types to gather information and target government agencies, SMBs and enterprises – in addition to consumers. In this post, I’d like to share my strong point of view on a topic that is relevant to most of us as business professionals: sharing (over-sharing, I should say) personal information … [Read more...]
CEO Fraud: are you at risk?
CEO Fraud, also known as Business Email Compromise (BEC), is a sophisticated scam targeting businesses of all sizes leveraging social engineering. The ultimate objective is to get unauthorized transfers of funds to the fraud actors’ bank accounts. It’s all about hard cash and top executives being the targets of such scams. There are 3 main attack methods: Phishing … [Read more...]