[ad] The service leader for Cloud is now in Australia. Secure, reliable cloud and managed hosting all backed by 24x7x365 Fanatical Support. Create your free account now.
Buy an Seagate Business Storage NAS for your chance to win a holiday
[ad] Purchase a selected Seagate Business Storage NAS to receive a $20 cash-back AND go into the draw to win a $1,000 Flight Centre voucher so you can holiday in the destination of your choice. T&Cs apply.
How mobile and social media affect your Customer Experience strategy
[ad] How will the adoption of mobile devices and social media affect your Customer Experience strategy? Are you reaching your organisation's customers through these touch points? Click here to download a whitepaper by Fifth Quadrant examining consumer and business attitudes to these new contact channels.
Great articles on other sites
- Turnbull to release NBN review next week
- Canberra blitzes states with NBN take-up rates
- War on whistleblowers from Abbott, Turnbull as ICJ case arrives
- Stockland tech revamp at centre of growth plans
- Clare warns of Gonski-like backflips on the NBN
- Victoria seeks early buy-in to avoid past disasters
- Vtalk bucks the China trend with plan for Aussie build
- Booksellers bristle at Amazon's arrival
- Australian customers upbeat on Dell going private
- FTTP NBN supporters lobby Turnbull
50 things top IT pros need to know
[ad] This 18 page TechRepublic whitepaper explores 10 things you should know to become an epic IT manager, 40 other essential tips to advance your IT career and practical guidance for starting an IT consulting business. Click here to access the whitepaper.
The new IT manager: Trends affecting IT in business
[ad] The tables have turned for IT managers. IT used to be able to dictate which computing assets would be used by employees and how they would be used. No longer. This free GigaOM Pro research paper (click here to download it) gives a solid, fact-based perspective on how IT consumerisation, mobile computing and cloud delivery trends are changing the paradigm.
Enterprise IT, News - Written by Vijith Vazhayil, Chillibreeze on Wednesday, February 29, 2012 11:44 - 0 Comments
Hacks focus CIOs on IT security
news After the spate of high-profile hacking incidents in 2011, Australian CIOs and IT and security managers are taking no chances this year. According to new research by local analyst firm Telsyte, Australian enterprises will increase their security spending and change their information security strategies in 2012.
Telsyte said that it surveyed more than 320 senior IT executives on their information security priorities, spending intentions, and products and services usage as part of the Telsyte Australian CIO information security priorities study 2012, which the company claims is one of the largest local market research studies of its type.
The study indicated that nearly a quarter of Australian enterprises plan to change their security strategies as a result of the events of 2011. It said that an increased awareness of security among the board and senior management members represented the most significant strategic shift. There is also going to be more focus now on operating system security, backups and disaster recovery.
According to Telsyte senior analyst Rodney Gedda, for many Australian CIOs and security engineers, the untoward events of 2011 have turned into a blessing. “Security is often viewed by senior management as an unwanted operating expense, but when the company’s reputation and revenue is exposed, as demonstrated so flagrantly last year, security becomes more strategic,” said Gedda.
Going by Telsyte’s research, security spending is also on the up with 29 per cent of organisations planning to increase their budget in 2012.
“With security spending on the up this year, CIOs are looking to engage with numerous providers to defend their organisations against increasingly multi-faceted threats,” said Gedda. The top security priorities for CIOs is stopping malware and preventing external attacks, but there is an increasing amount of concern around the threat that mobile devices like smartphones and media tablets pose, as well as cloud computing. The study pointed out that approximately 20 per cent of CIOs rate mobile and cloud security as a critical priority and around one-third rate them as very important.
“While mobile and cloud security are still relatively low on the security priority list for CIOs, these will become an increasing priority, particularly if there are high-profile incidents relating to these two trends,” said Gedda. He added, “A significant percentage of organisations have experienced at least one information security breach over the past 12 months, indicating threats are very real and require constant defence. Mobile security incidents outnumber cloud data breaches, but with the events of 2011 looking to continue this year CIOs need to be prepared for a high-profile security incident outside their organisation’s borders.”
It’s all very nice to say that CIOs are increasing spending on security, but what does this really mean? IT security vendors have known for a very long time that the desktop PC security market — where most of the threats come into organisations — has been commoditised. Virtually every large organisation has a comprehensive anti-virus/anti-malware ‘kitchen sink’-style suite installed on their employees’ desktop PCs and has had for years.
The same is often true of server environments. Firewalls, server-side email anti-spam/anti-malware suites, server protection tools, off-site backup and disaster recovery … much of this has been in place for years. And physical building security is pretty well understood.
One area which I would think organisations would need to look more closely at would be more discrete data protection. That is, not just throwing a security blanket over an organisation’s entire data set, but looking at what sets of data are critical to the organisation and need to be protected with higher levels. Any data used by the top levels of executive management, for starters: You don’t want the CEO’s email or the CFO’s spreadsheets being stolen. Customer database, secret product development initiatives; this kind of stuff.
Anything that’s going to provide the organisation with a sustainable market advantage, or threaten ongoing operations, probably needs a higher level of protection than run of the mill information.
I would also bet that some organisations are starting to invest, finally, in data encryption. For the longest time, corporate data has been firewalled off and scanned for malware; but it hasn’t been encrypted. But mass corporate encryption, with the tools to do so centrally administered, could do a lot for data leakage. Even if you can steal the data, it won’t mean much if it’s scrambled.
Opinion/analysis by Renai LeMay
Latest Delimiter 2.0 articles (subscriber content)
|Politicians from Australia’s major parties need to stop issuing ludicrous blanket pardons for the intelligence community’s ongoing misdemeanours and start applying a basic modicum of transparency and accountability to this important national security function.|
|The independent pro-fibre National Broadband Network movement is doing a far better job of promoting Labor’s Fibre to the Premises-based NBN policy than Labor itself. When is Labor going to wake from its slumber and start supporting this scrappy but energetic grassroots network of activists?|
|Ziggy Switkowski's first substantial public appearance since being appointed NBN Co chief executive has starkly demonstrated just how different he is from his predecessor, Mike Quigley, and just how strictly he will adhere to the guidelines which his patron, Communications Minister Malcolm Turnbull, has set for him.|
|Australian technology companies have been virtually absent from the the nation’s public stockmarket over the past decade as the stigma of the dot com bust took its toll on investor confidence. But a clutch of new listings planned for the closing months of 2013 shows renewed interest in the sector and that local entrepreneurs are smelling money in the air once again.|
|NBN Co’s Strategic Review process gives the company an unmissable opportunity to re-evaluate the early decision to deploy its FTTP network primarily through Telstra’s underground ducts. The company and its new Coalition masters must now seriously consider deploying more fibre aerially on power poles in an effort to speed up its rollout substantially.|
|That moment which many Australian technologists fervently hoped for but never expected to see has come to pass: Simon Hackett has been appointed to the board of the National Broadband Network Company. But what questions should the Internode founder be asking NBN Co’s executive management team? Here’s five ideas to start with.|
|The rapid replacement of respected NBN Co chief operating officer Ralph Steffens with a Telstra executive who appears less experienced with fibre rollouts but better politically connected represents a key signal that NBN Co’s senior executive hiring process has now become completely politicised and is no longer independent from the Federal Government.|
Enterprise IT, News - Dec 6, 2013 12:50 - 0 Comments
More In Enterprise IT
- Payroll disaster: Queensland sues IBM
- End of an era: Oracle Australia’s ‘safe hands’ leaves
- Qld launches whole of government IaaS panel
- Defence finally allows staff iPhones, iPads
- NSW Govt refreshes ICT Advisory Panel
News, Telecommunications - Dec 6, 2013 11:54 - 74 Comments
More In Telecommunications
- NBN Co internal FTTN analysis: Turnbull refuses to retract inaccurate claim
- Defying the Senate: Turnbull to release NBN Review by end of 2013
- Senate to force Turnbull to publish NBN Review
- Get on with FTTN job, Quigley tells NBN Co
- Senate circus shows politics has no place in NBN
More In Industry
- Xbox One goes off with a bang … but will the PS4 launch eclipse it?
- It’s not just Freelancer: Aussie tech IPOs are back in general
- Freelancer’s IPO: A billion reasons to care
- Australian retailers online: Late to the party and much to do
- DesignCrowd picks up another $3m
Digital Rights, News - Dec 5, 2013 14:08 - 25 Comments
More In Digital Rights
- Global privacy group files formal ASD complaint
- Labor open to surveillance discussion
- Snowden an “American traitor”, says Australia’s Attorney-General
- ASD goes rogue with Aussie metadata
- It’s live: Delimiter publishes AGD FoI mirror