Articles

Whether you use Zoom, Skype or Microsoft Teams, the webcam on your home PC or laptop device has probably never been as active as it is during this pandemic. Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study or virtual socialising. Unfortunately, this privilege can leave us vulnerable to an online attack known as camfecting. This is when hackers take control of your webcam remotely. They do this by disabling the “on” light which usually indicates the camera is active – so victims are none the wiser.

Despite the plethora of alternatives, nothing has yet completely replaced email for business communications, especially for businesses communicating with other businesses. Important documents including contracts, requests for proposal and plans are all usually sent as email attachments. Email provides a relatively fast, secure, and efficient way of communicating, especially compared with the days when businesses had to courier these documents to each other or send them via fax without knowing for certain who was at the other end.  

An audit has found significant gaps in the controls over unauthorised access the NSW Registry of Births Deaths and Marriages (BD&M), leading to increased risk of unauthorised information leaks.

There is no doubt that cloud storage systems are becoming a popular option for businesses. On-premise storage can be costly, and it usually requires an IT staff to manage it.

One of the most interesting features that has been added to the PDF format since its inception way back in 1993 is the ability to create portable collections, more commonly known as PDF portfolios. Portable collections were introduced by the ISO committee as part of the PDF 1.7 specification (and expanded in PDF 2.0) and can contain multiple files integrated into a single PDF. Although “portable collection” is the name defined in the specification, for convenience we’ll be using “PDF portfolio” for the rest of this article.

Pages